home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.unix.ultrix
- Path: sparky!uunet!mcsun!Germany.EU.net!ifado!wb
- From: wb@arb-phys.uni-dortmund.de (Wilhelm B. Kloke)
- Subject: Re: Using YP/NIS
- Message-ID: <1992Nov9.082248.16757@arb-phys.uni-dortmund.de>
- Organization: Institut f. Arbeitsphysiologie a.d. Uni Dortmund
- References: <Bx75qz.3Ko@cck.coventry.ac.uk> <1992Nov5.071608.26394@arb-phys.uni-dortmund.de> <1992Nov7.121002.165@degsyd.syd.deg.csiro.au>
- Date: Mon, 9 Nov 92 08:22:48 GMT
- Lines: 38
-
- In article <1992Nov7.121002.165@degsyd.syd.deg.csiro.au> ip_boss@degsyd.syd.deg.csiro.au (Jack Churchill) writes:
- >NIS is widely used yet I keep seeing bad things said about it. Why? I
- I surely did not want to say anything bad about YP. YP is fine but not
- for people with enhanced security needs. I am not sure that people
- wanting enhanced security will get what they want; surely they will get
- all sorts of trouble.
- >also see some people have problems using DEC's UPGRADE or ENHANCED mode
- >and usually are forced to go back to normal BSD security. What's the
- >best method in a mixed environment? Just NFS mount the relevant things
- without YP? You need some sort of user identification across the system
- if you don't want to restrict access to read-only.
- >instead? Even in an Ultrix-only environment I like to know what
- >people's feelings are towards UPGRADE and ENHANCED security. Is UPGRADE
- >a reasonable compromise so that some "unsupported" packages can be
- >tricked into thinking the normal BSD passwd file is ok but the real
- >password file is hidden (i.e., shadow password file) and is the one used
- >for normal logins? Also, when NIS or some other method is used to
- >service things like a common password file, isn't it a major problem if
- >the server goes down? I don't know but I like the idea of having
- YP duplicates the files on all servers. So you may have more than 1
- server, e.g. 1 Server on every Ethernet Segment.
- >standalone workstations and just centralising e-mail and NFS disks. At
- >least the users can log onto their own machines whilst the server is
- The local password file normally contains root and other vital accounts.
- These are not distributed over the net.
- >down for whatever reason, to perform some local tasks. I know, it all
- >depends but I like some feedback to improve my limited understanding of
- >unix systems (I'm from a VMS background).
- As you see, the options offered by Unix (combining a local password file
- with a network password file) are more easily maintainable as any VMS
- solution, where you have to use and generate a lot of different Proxies.
- You cannot even use any sort of site dependent processing on the UAF
- file on VMS, whereas you can easyly use awk or perl on the unix password
- files. The latter compensates for the seeemingly lower security IMHO.
- --
- Dipl.-Math. Wilhelm Bernhard Kloke,
- Institut fuer Arbeitsphysiologie an der Universitaet Dortmund
- Ardeystrasse 67, D-4600 Dortmund 1, Tel. 0231-1084-257
-