Re: Re: NIS with shadow passwords

2001-02-01 Thread Paolo Pedaletti
Ciao Richard Cobbe,

 department's NIS server on a Solaris box upstairs.  This works just fine
 with RH 6.2, so I'm guessing it'll be fine with potato, but confirmation
 before the install would be nice.
 
 Will that work?

I don't know if this may be usefull, but here there is the following
situation:
SERVER RH with NIS+
CLIENT Debian 2.2 with NIS

and it works.

sure it would be mutch better if NIS+ could be found under Debian too.

I'm not an expert, but outside the local network none can access in (I hope
;-) and inside none can sniff the net

As soon as possible I will upgrade RH Server to Debian :-)))

-- 

Paolo Pedaletti, Como, ITALYa www.fastflow.it/~paolop
[EMAIL PROTECTED]   ICQ: 4755831



NIS with shadow passwords

2001-01-25 Thread Pedro Pereira
Hi.
I have NIS installed and working good on my LAN.
But I'd like to install shadow passwords as well.
I've tried it, but as I compile the NIS maps, the users aren't no longer
able to login :(
Could somebody please help me?
Thanks.
-- 
Pedro Pereira

[EMAIL PROTECTED]
Linux do DEEC - FEUP



Re: NIS with shadow passwords

2001-01-25 Thread Nate Amsden
Pedro Pereira wrote:
 
 Hi.
 I have NIS installed and working good on my LAN.
 But I'd like to install shadow passwords as well.
 I've tried it, but as I compile the NIS maps, the users aren't no longer
 able to login :(
 Could somebody please help me?
 Thanks.

use NIS+ ..i believe the NIS with linux does not support shadow.
although i am
not aware of a NIS+ solution that is debianized in stable.

you can search the www for how to do NIS+ in linux but the process seems
quite involved if your not using a supported distro like SuSE (since i
think
most of the NIS+ development is done by SuSE employees ..) i tried doing
it with debian 2.0 ..and..ended up reinstalling because i hosed my libc
bad.

when i wanted a NIS server with shadow i decided on solaris 7(sparc)
on an ultra 10 ..

nate

-- 
:::
ICQ: 75132336
http://www.aphroland.org/
http://www.linuxpowered.net/
[EMAIL PROTECTED]



Re: NIS with shadow passwords

2001-01-25 Thread Richard Cobbe
Lo, on Thursday, January 25, Nate Amsden did write:

 Pedro Pereira wrote:
  
  Hi.
  I have NIS installed and working good on my LAN.
  But I'd like to install shadow passwords as well.
  I've tried it, but as I compile the NIS maps, the users aren't no longer
  able to login :(
  Could somebody please help me?
  Thanks.
 
 use NIS+ ..i believe the NIS with linux does not support shadow.
 although i am
 not aware of a NIS+ solution that is debianized in stable.

Is this the NIS server, or the NIS client?  I'm about to try installing
potato on a machine at work, and I need to be able to work off our MIS
department's NIS server on a Solaris box upstairs.  This works just fine
with RH 6.2, so I'm guessing it'll be fine with potato, but confirmation
before the install would be nice.

Will that work?

Richard



Re: NIS with shadow passwords

2001-01-25 Thread Viktor Rosenfeld
Nate Amsden wrote:

 you can search the www for how to do NIS+ in linux but the process seems
 quite involved if your not using a supported distro like SuSE (since i
 think
 most of the NIS+ development is done by SuSE employees ..) i tried doing
 it with debian 2.0 ..and..ended up reinstalling because i hosed my libc
 bad.

NIS+ support in general can be found at
http://www.suse.de/~kukuk/nisplus/, but it's not an easy task to install
(at least on RedHat it's not).  You'll have to fiddle with the PAM
entries a bit, to get thinks working properly.

There is also a debianized version available at 
  deb http://www.realbodo.de/ debian/
  deb-src http://www.realbodo.de/ debian/
but I haven't played with that.  Chances are, it works quite well out of
the box.

Good luck,
Viktor
-- 
Viktor Rosenfeld
WWW: http://www.informatik.hu-berlin.de/~rosenfel/
Geek Code (3.1):
  GCS/SS d-@ s+: a20 C++@ UL++$ P+ L+++ E--- W++ N++ o? K? !W O? M? V?
  PS++@ PE+(-) Y+ P?(+++) t+ 5+ X- R? !tv b+ DI+ D- G e+++ h-- r- !y+



Re: NIS with shadow passwords

2001-01-25 Thread Rodrigo Morais Araujo



Richard Cobbe wrote:


Lo, on Thursday, January 25, Nate Amsden did write:


Pedro Pereira wrote:


Hi.
I have NIS installed and working good on my LAN.
But I'd like to install shadow passwords as well.
I've tried it, but as I compile the NIS maps, the users aren't no longer
able to login :(
Could somebody please help me?
Thanks.


use NIS+ ..i believe the NIS with linux does not support shadow.
although i am
not aware of a NIS+ solution that is debianized in stable.



Is this the NIS server, or the NIS client?  I'm about to try installing
potato on a machine at work, and I need to be able to work off our MIS
department's NIS server on a Solaris box upstairs.  This works just fine
with RH 6.2, so I'm guessing it'll be fine with potato, but confirmation
before the install would be nice.

Will that work?

Richard


  I got this problem a moth ago, the error began when I tried to make 
the NIS maps. But I edited a Makefile turnig on some think about 
merging shadown files (I don't remember more and I don't have the 
system more).


[]'s

--
_

Rodrigo Morais Araujo
[EMAIL PROTECTED]
  [EMAIL PROTECTED]
  [EMAIL PROTECTED]
_

Be Free! Use Linux.



Re: Linux nis and shadow passwords, non Linux clients

1999-04-23 Thread Andreas Jellinghaus
 Next problem: The net nis master runs slink. A slink client works after
 shadow has been configured and + added to /etc/shadow.
 A client runs partly potato, and does not work, i.e. it won't accept nis
 passwords. NIS itself appears to work, i.e. I can see the right owners of
 directories, the homedirs are right, etc. Any known incompatibilities
 between glibc2.1 and shadow nis?

glibc2.0 and nis: at least the expire field is not copied into the right
structure. so you always get -1 when reading the shadow password fields.
this happends only when you are useing the compat mode. if you are useing
shadow: files nis it works ok.

if you don't need the extra features of shadow (expiry, password age etc.),
don't use it. many programs do not honor these fileds anyway (e.g. login.app).

andreas


Linux nis and shadow passwords, non Linux clients

1999-04-22 Thread Nils Rennebarth
I recently switched our nis master server from AIX to linux.
There are still a number of AIX hosts that should be run as nis clients or
nis slaves.

How do non shadow password clients get the password entries?
How do I make it on AIX which doesn't have shadow passwords but a 
similar mechanism using /etc/security/passwd with a syntax linke this:

root:
password = mYfasd/89ßsx # this is not the right one of course
lastupdate = 829567557
flag =

nextuser:

Next problem: The net nis master runs slink. A slink client works after
shadow has been configured and + added to /etc/shadow.
A client runs partly potato, and does not work, i.e. it won't accept nis
passwords. NIS itself appears to work, i.e. I can see the right owners of
directories, the homedirs are right, etc. Any known incompatibilities
between glibc2.1 and shadow nis?


Nils

--
Plug-and-Play is really nice, unfortunately it only works 50% of the time.
To be specific the Plug almost always works.--unknown source


pgpXEJnRtee2r.pgp
Description: PGP signature


Re: Linux nis and shadow passwords, non Linux clients

1999-04-22 Thread Nils Rennebarth
Again following up on my own posts, sigh:

On Thu, Apr 22, 1999 at 03:22:58PM +0200, Nils Rennebarth wrote:
 Next problem: The net nis master runs slink. A slink client works after
 shadow has been configured and + added to /etc/shadow.
 A client runs partly potato, and does not work, i.e. it won't accept nis
 passwords. NIS itself appears to work, i.e. I can see the right owners of
 directories, the homedirs are right, etc. Any known incompatibilities
 between glibc2.1 and shadow nis?
Hrmm, deinstalling nis and installing it again worked. This is getting
Windows like, except that reboots are not necessary.

What should I do however for clients that do not have shadow passwords? Is
there a way to give them a made up password file with entries from real
passwd and shadow mixed? (security reasons aside)

Nils

--
Plug-and-Play is really nice, unfortunately it only works 50% of the time.
To be specific the Plug almost always works.--unknown source


pgp46YKJiRKiD.pgp
Description: PGP signature


Re: Linux nis and shadow passwords, non Linux clients

1999-04-22 Thread Jens B. Jorgensen
Hmmm, perhaps you'll have to generate your own intermediate passwd file to
generate the NIS maps. However, I would perhaps reconsider using shadow. Unless
you're only serving up some (not root, etc.) passwords from NIS and have set up
NIS to work this way there's no benefit to running shadow locally since NIS is
100% insecure (ie. it'll give up password entries to anyone on your network who
asks).

Nils Rennebarth wrote:

 Again following up on my own posts, sigh:

 On Thu, Apr 22, 1999 at 03:22:58PM +0200, Nils Rennebarth wrote:
  Next problem: The net nis master runs slink. A slink client works after
  shadow has been configured and + added to /etc/shadow.
  A client runs partly potato, and does not work, i.e. it won't accept nis
  passwords. NIS itself appears to work, i.e. I can see the right owners of
  directories, the homedirs are right, etc. Any known incompatibilities
  between glibc2.1 and shadow nis?
 Hrmm, deinstalling nis and installing it again worked. This is getting
 Windows like, except that reboots are not necessary.

 What should I do however for clients that do not have shadow passwords? Is
 there a way to give them a made up password file with entries from real
 passwd and shadow mixed? (security reasons aside)

 Nils

 --
 Plug-and-Play is really nice, unfortunately it only works 50% of the time.
 To be specific the Plug almost always works.--unknown source

   
Part 1.2Type: application/pgp-signature

--
Jens B. Jorgensen
[EMAIL PROTECTED]



Re: Linux nis and shadow passwords, non Linux clients

1999-04-22 Thread Miquel van Smoorenburg
In article [EMAIL PROTECTED],
Jens B. Jorgensen [EMAIL PROTECTED] wrote:
Hmmm, perhaps you'll have to generate your own intermediate passwd file to
generate the NIS maps.

Ah yes, a possibility is to include the password in /etc/password, and
then filter that out again for shadow-capable hosts using /etc/ypserv.conf

 However, I would perhaps reconsider using shadow. Unless
you're only serving up some (not root, etc.) passwords from NIS and have set up
NIS to work this way there's no benefit to running shadow locally since NIS is
100% insecure (ie. it'll give up password entries to anyone on your network who
asks).

Not true. If set up correctly, it will only serve shadow maps to requests
originating from secure ports (eg  1023), which means a root process.
Ofcourse that means you do have to trust all root users on your network.

But turning off shadow is certainly the easiest solution (shadowconfig off).
You can still have shadow-like security using /etc/ypserv.conf, a
feature unique to to the Linux NIS server.

Mike.
-- 
Indifference will certainly be the downfall of mankind, but who cares?


Re: Linux nis and shadow passwords, non Linux clients

1999-04-22 Thread Jens B. Jorgensen
Nils Rennebarth wrote:

 On Thu, Apr 22, 1999 at 10:01:53AM -0500, Jens B. Jorgensen wrote:
  Hmmm, perhaps you'll have to generate your own intermediate passwd file to
  generate the NIS maps. However, I would perhaps reconsider using shadow. 
  Unless
  you're only serving up some (not root, etc.) passwords from NIS and have 
  set up
  NIS to work this way there's no benefit to running shadow locally since NIS 
  is
  100% insecure (ie. it'll give up password entries to anyone on your network 
  who
  asks).
 What I'm worrying about is that a remote cracker guesses a local password
 then logs in on our server and snatches the passwd file to crack the root
 account (not that root has a password that I expect someone to crack, but
 who knows..)

 The way it runs currenty, a remote user has to crack a local root account,
 to ask for the encrypted passwords.


 And yes, I do only serve user passwords  id 100 by NIS.

Understood. Actually, I do something similar: we use NIS behind the firewall 
but the
firewall machine itself is an NIS client. In our situation things were a little
backwards though because we had a Sun serving up the NIS maps and linux boxen as
clients. The sun supports shadow but shadow maps are only served through NIS+.
Unfortunately, NIS+ support is just now coming together in Linux. This is all
academic though...

So, whatcha need to do is customize your /var/yp/Makefile which builds the 
actual db
files. If you open up your /var/yp/Makefile you'll find something like (snipped 
from
my own file):

passwd.byname: $(PASSWD) $(YPDIR)/Makefile
   @echo Updating [EMAIL PROTECTED]
@$(UMASK); \
$(AWK) -F: '!/^[-+#]/ { if ($$1 !=   $$3 = $(MINUID) ) \
   print $$1\t$$0 }' $(PASSWD) | $(DBLOAD) -i $(PASSWD) \
-o $(YPMAPDIR)/$@ - $@
[EMAIL PROTECTED](NOPUSH) || $(YPPUSH) -d $(DOMAIN) $@


passwd.byuid: $(PASSWD) $(YPDIR)/Makefile
@echo Updating [EMAIL PROTECTED]
@$(UMASK); \
$(AWK) -F: '!/^[-+#]/ { if ($$1 !=   $$3 = $(MINUID) ) \
   print $$3\t$$0 }' $(PASSWD) | $(DBLOAD) -i $(PASSWD) \
 -o $(YPMAPDIR)/$@ - $@
[EMAIL PROTECTED](NOPUSH) || $(YPPUSH) -d $(DOMAIN) $@

All we need to do is to pull the password field out of /etc/shadow and join it
together with the rest of the data in /etc/passwd before putting it into the db 
file.
We can easily do this using the join command so we modify the the above to:

passwd.byname: $(PASSWD) $(SHADOW) $(YPDIR)/Makefile
   @echo Updating [EMAIL PROTECTED]
@$(UMASK); \
/usr/bin/join -t : -j 1 -o 1.1 2.2 1.3 1.4 1.5 1.6 1.7 $(PASSWD) 
$(SHADOW) |
\
$(AWK) -F: '!/^[-+#]/ { if ($$1 !=   $$3 = $(MINUID) ) \
   print $$1\t$$0 }' | $(DBLOAD) -i $(PASSWD) \
-o $(YPMAPDIR)/$@ - $@
[EMAIL PROTECTED](NOPUSH) || $(YPPUSH) -d $(DOMAIN) $@


passwd.byuid: $(PASSWD) $(SHADOW) $(YPDIR)/Makefile
@echo Updating [EMAIL PROTECTED]
@$(UMASK); \
/usr/bin/join -t : -j 1 -o 1.1 2.2 1.3 1.4 1.5 1.6 1.7 $(PASSWD) 
$(SHADOW) |
\
$(AWK) -F: '!/^[-+#]/ { if ($$1 !=   $$3 = $(MINUID) ) \
   print $$3\t$$0 }' | $(DBLOAD) -i $(PASSWD) \
 -o $(YPMAPDIR)/$@ - $@
[EMAIL PROTECTED](NOPUSH) || $(YPPUSH) -d $(DOMAIN) $@

I haven't tested the above (except for the join command itself) but I believe 
it'll
do just exactly right.

--
Jens B. Jorgensen
[EMAIL PROTECTED]