<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NIS+ encrypted? in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599602#M741802</link>
    <description>The answer is yes and yes. The biggest improvement from the standpoint of passwords (not actually encrypted but hashed) is that &lt;BR /&gt;under NIS the passwd hash is easily obtained by nothing more than ypcat passwd from any client. These password hashes are then subject to a dictionary-based attack (e.g. crack) under NIS+, niscat passwd returns a '*' in the hash field.</description>
    <pubDate>Tue, 09 Aug 2005 10:35:50 GMT</pubDate>
    <dc:creator>A. Clay Stephenson</dc:creator>
    <dc:date>2005-08-09T10:35:50Z</dc:date>
    <item>
      <title>NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599599#M741799</link>
      <description>Question:  One of our techs heard from a HP tech that NIS+ is "encrypted".  I'm thinking that he(HP tech) means that the password string is encrypted, while I'm wanting to know if the transmission of NIS+ data itself (the whole communication stream) is encrypted or encryptable for supporting logins.  And, will that work with a trusted host? shadow passwords?  HP tech says it does, while I've read in places that it doesn't.</description>
      <pubDate>Tue, 09 Aug 2005 09:58:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599599#M741799</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2005-08-09T09:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599600#M741800</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;NFS Services Administrator's Guide &lt;BR /&gt;Chapter 5. Configuring and Administering NIS+&lt;BR /&gt; Overview of NIS+&lt;BR /&gt;&lt;BR /&gt;"NIS+ is secure. It uses a private key/public key authentication scheme with DES encryption. Every user and host in the namespace has its own unique credentials, and you can decide which users and hosts will be allowed to read or modify the information in each NIS+ domain."&lt;BR /&gt;&lt;BR /&gt;But nothing specific about encrypted transmission  -  yet  -  still reading. . . .&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Tue, 09 Aug 2005 10:05:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599600#M741800</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2005-08-09T10:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599601#M741801</link>
      <description>the login/credential transmissions for NIS+ are, as far as I remember, kerberized, so both encrypted and non-replayable.&lt;BR /&gt;but I've never run NIS+, so I can't promise it :(&lt;BR /&gt;&lt;BR /&gt;trusted: yes&lt;BR /&gt;shadow: i think yes (the shadowing would only apply to local-only passwords, hmm?)</description>
      <pubDate>Tue, 09 Aug 2005 10:27:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599601#M741801</guid>
      <dc:creator>Florian Heigl (new acc)</dc:creator>
      <dc:date>2005-08-09T10:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599602#M741802</link>
      <description>The answer is yes and yes. The biggest improvement from the standpoint of passwords (not actually encrypted but hashed) is that &lt;BR /&gt;under NIS the passwd hash is easily obtained by nothing more than ypcat passwd from any client. These password hashes are then subject to a dictionary-based attack (e.g. crack) under NIS+, niscat passwd returns a '*' in the hash field.</description>
      <pubDate>Tue, 09 Aug 2005 10:35:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599602#M741802</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-08-09T10:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599603#M741803</link>
      <description>Pete, Florian, and A. Clay - thanks for your responses.  So, this is, in your opinion - a good solid solution for today - or would you push a group towards ldap if re-reviewing (redundant to be rhetorical :-) ) options?</description>
      <pubDate>Tue, 09 Aug 2005 10:55:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599603#M741803</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2005-08-09T10:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599604#M741804</link>
      <description>I think LDAP is a better solution that NIS+.  With LDAP you could, potentially, have a single solution for the entire enterprise (Unix, Windows, etc.).&lt;BR /&gt;&lt;BR /&gt;NIS+ limits you to Unix only, and only those flavors that support NIS+.</description>
      <pubDate>Tue, 09 Aug 2005 10:59:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599604#M741804</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2005-08-09T10:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599605#M741805</link>
      <description>John,&lt;BR /&gt;&lt;BR /&gt;I would avoid NIS+ like the plague.  Here's another quote from the same manual:&lt;BR /&gt;&lt;BR /&gt;"Disadvantages of NIS+&lt;BR /&gt;&lt;BR /&gt;NIS+ has the following disadvantages:&lt;BR /&gt;&lt;BR /&gt;    *&lt;BR /&gt;&lt;BR /&gt;      NIS+ is difficult to administer. It requires dedicated system administrators trained in NIS+ administration. NIS+ administration is very different from NIS administration.&lt;BR /&gt;    *&lt;BR /&gt;&lt;BR /&gt;The NIS+ databases are not automatically backed up to flat files. The system administrator must create and maintain a backup strategy for NIS+ databases, which includes dumping them to flat files and backing up the files."&lt;BR /&gt;&lt;BR /&gt;The key portion of that, for me at least, is the line "NIS+ is difficult to administer."&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Tue, 09 Aug 2005 11:03:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599605#M741805</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2005-08-09T11:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599606#M741806</link>
      <description>If NIS+ does use DES, then that isn't very secure encryption anyway.  DES is an old algorithm and attacks against it are well known. &lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Aug 2005 11:42:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599606#M741806</guid>
      <dc:creator>Steve Lewis</dc:creator>
      <dc:date>2005-08-09T11:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599607#M741807</link>
      <description>How many users and computers are you dealing with?  What OS platforms.&lt;BR /&gt;Unless your answer is thousands of users and thousands of systems, its better to stay away from NIS, NIS+, and LDAP.  You can make any of it work, but they are all very needy environments.  Your company would be better off carefully evaluating a user creation/management tool that is flexible and easy to use.&lt;BR /&gt;On paper this central environment sounds cool, but in reality its a pain.  Look for good account management tools, and look beyond the security.  Also a good managment tool will have good security built in, and it wont be open source that some script kiddy has access too.  IF NIS goes down all of your users suddenly have a problem.  Not good.&lt;BR /&gt;&lt;BR /&gt;Best of luck</description>
      <pubDate>Tue, 09 Aug 2005 12:22:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599607#M741807</guid>
      <dc:creator>generic_1</dc:creator>
      <dc:date>2005-08-09T12:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599608#M741808</link>
      <description>I have never found NIS+ all that difficult although very little of your NIS knowledge will prove useful in an NIS+ world. NIS+'s main drawback is that it is rapidly becoming extinct. If your application software will allow LDAP then that is really your best bet.</description>
      <pubDate>Tue, 09 Aug 2005 14:27:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599608#M741808</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-08-09T14:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599609#M741809</link>
      <description>A. Clay - what are the "forces" making it extinct?  Are *NIX variants dropping support for it ?  Announcing it?  Just curious as I've heard the same thing - I'm just wondering if it's a concrete thing, or folks at HP (and other) putting the word out to see if the user community starts screaming and crying about it or not.</description>
      <pubDate>Tue, 09 Aug 2005 15:26:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599609#M741809</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2005-08-09T15:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599610#M741810</link>
      <description>Do a man nis (which includes NIS+). Under the WARNINGS section you will see "HP-UX 11i Version 2 is the last HP-UX on which NIS+ is supported."&lt;BR /&gt;&lt;BR /&gt;Essentially there is nothing that NIS+ can do that LDAP can't do at least as well and is more portable. Like NIS+, little of your NIS knowledge will apply to LDAP. Because I would never trust my passwords to a Windows anything, I always run a UNIX or Linux LDAP server.</description>
      <pubDate>Tue, 09 Aug 2005 16:14:07 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599610#M741810</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2005-08-09T16:14:07Z</dc:date>
    </item>
    <item>
      <title>Re: NIS+ encrypted?</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599611#M741811</link>
      <description>Wow A. Clay - that REALLY tells the tale then doesn't it?  Thanks for the critical info.</description>
      <pubDate>Tue, 09 Aug 2005 16:36:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-encrypted/m-p/3599611#M741811</guid>
      <dc:creator>TwoProc</dc:creator>
      <dc:date>2005-08-09T16:36:54Z</dc:date>
    </item>
  </channel>
</rss>

