> >I also suggest you use ANYTHING but NIS.  NIS+ and LDAP are infinitely
> >better when it comes to the security aspects of name service.
>
> From a security perspective, I'll grant you that NIS is horrible, but
> from a management perspective, NIS+ and LDAP appear to a lot worse.
> That, and AFAIK, there is no NIS+ implementation for Linux.
> Besides, why would you *want* to use something which the developers
> themselves (Sun) have all but abandoned and don't use?

For Linux NIS+, see:
http://www.ibiblio.org/mdw/HOWTO/NIS-HOWTO/x332.html#AEN334

For NIS fans, NIS+ is an easy next step, from which you gain a great deal
of security.  Since host authenticity is based on knowledge of a DES (or
3DES) key, and not an IP address, spoofing is much more difficult (if not
impossible).

I'd only feel comfortable using NIS if it were used in conjunction with
Kerberos.  Keep the passwords in Kerberos, and the rest in NIS.

True, Sun (and Microsoft, it seems, with ADS) is moving to LDAP.  It
provides ultimate flexibility, and provide name service for many different
types of applications.  For example, I've used the same LDAP database for
distributing /etc/passwd (posixAccount schema) information, mail
forwarding (aliases with Sendmail-LDAP), and general directory information
(such as office, phone number, etc).

> As far as LDAP?  I keep hearing that it's the next best thing, but
> there don't seem to many tools for using it in a large scale
> enterprise environment.  There are some out there, but it seems that
> they're slow in coming.  And man is that record format overly verbose
> and tedious to deal with!

Well, the concepts a bit harder to understand than that of NIS/NIS+.  As
for the record format, just include the relavent schemas.  I admit, it's
overkill for a small organization, but can provide the needed structure
for larger organizations.

> Nah, even for all it's insecurities, I like NIS.  It easy to deal
> with and simple to manage.  And if you really need the security, then
> just use something like rdist or rsync to push around the
> passwd/shadow maps.  If you're in an all Linux/Unix environment, it's
> trivial to create a sysVinit script that pulls down the most recent
> files at boot time.

Hmm... /etc/passwd and /etc/shadow floating around the network.  That
makes me a little nervious.

In my opinion, for the most flexibility and compatability, a combination
of Kerberos 5 and LDAP works best.  In fact, Microsoft's ADS provides both
those interfaces, one could have a single account for all users, that
supports both Windows and UNIX environments.

--
t. charles clancy <> [EMAIL PROTECTED] <> www.uiuc.edu/~tclancy
coordinated science laboratory <> university of illinois
cryptography and information protection

Reply via email to