<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NIS security risks in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700128#M757115</link>
    <description>Hi Eduardo,&lt;BR /&gt;&lt;BR /&gt; Definitely agree w/Clay!&lt;BR /&gt;No shadow file = easier to crack.&lt;BR /&gt;&lt;BR /&gt;If you have to use NIS you should use NIS+ &amp;amp; I would recommend the further step of NIS+ under a Trusted System (C2) `.&lt;BR /&gt;See the following URL for info &amp;amp; instrs on setting up NIS+ under a Trusted System.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff</description>
    <pubDate>Tue, 09 Apr 2002 16:55:15 GMT</pubDate>
    <dc:creator>Jeff Schussele</dc:creator>
    <dc:date>2002-04-09T16:55:15Z</dc:date>
    <item>
      <title>NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700126#M757113</link>
      <description>I know NIS is insecure. For me is a "necessary bad".&lt;BR /&gt;What are the most weak features for security on NIS?&lt;BR /&gt;and&lt;BR /&gt;How can I mitigate the security risks?&lt;BR /&gt;Does HP have a procedure to do it?&lt;BR /&gt;I will appreciatte your comments.&lt;BR /&gt;regards.</description>
      <pubDate>Tue, 09 Apr 2002 16:27:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700126#M757113</guid>
      <dc:creator>Eduardo Jaime M.</dc:creator>
      <dc:date>2002-04-09T16:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700127#M757114</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;The biggest hole in NIS is probably the lack of a shadow passwd file. If someone can do a 'ypcat passwd &amp;gt; myfile' the hashed passwords are visible. A user can then use a utility like 'crack' to attempt to find the plaintext passwd by comparing the hashed versions to those in 'myfile'.&lt;BR /&gt;&lt;BR /&gt;Your workarounds are 1) go to NIS+ 2) ensure that your passwds are very6 difficult to crack by build a more robust version of the yppasswd command.&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Apr 2002 16:32:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700127#M757114</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2002-04-09T16:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700128#M757115</link>
      <description>Hi Eduardo,&lt;BR /&gt;&lt;BR /&gt; Definitely agree w/Clay!&lt;BR /&gt;No shadow file = easier to crack.&lt;BR /&gt;&lt;BR /&gt;If you have to use NIS you should use NIS+ &amp;amp; I would recommend the further step of NIS+ under a Trusted System (C2) `.&lt;BR /&gt;See the following URL for info &amp;amp; instrs on setting up NIS+ under a Trusted System.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 09 Apr 2002 16:55:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700128#M757115</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-04-09T16:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700129#M757116</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;NIS is not that much secure as you can compare with system without NIS. &lt;BR /&gt;If you need security as well as NIS set up, then it is a great thing you can go ahead with NIS+ set up.&lt;BR /&gt;&lt;BR /&gt;NIS+ is quite different than NIS but if you follow step by step procedure in HP's manual about NIS+ setup, you can do great. NIS+ can be set up on trusted systems as well to enhance security.&lt;BR /&gt;&lt;BR /&gt;Looking to your case, you need to go for NIS+, it gives high security and not an easy task to break the NIS+ security.&lt;BR /&gt;&lt;BR /&gt;-pap&lt;BR /&gt;</description>
      <pubDate>Tue, 09 Apr 2002 16:55:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700129#M757116</guid>
      <dc:creator>pap</dc:creator>
      <dc:date>2002-04-09T16:55:58Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700130#M757117</link>
      <description>Thank You for your comments and suggest.&lt;BR /&gt;However, before go to NIS+ as a solution; I will keep using NIS. I need to know what are the risk outside the NIS? I know anyone inside NIS can read a map; but I'm thinking about external attacks (using sniffer, etc.. Do you know something like restrict port access, etc...something avoiding he map-read from outside.&lt;BR /&gt;Again, I'll appreciate your comments.&lt;BR /&gt;Tx.</description>
      <pubDate>Tue, 09 Apr 2002 17:06:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700130#M757117</guid>
      <dc:creator>Eduardo Jaime M.</dc:creator>
      <dc:date>2002-04-09T17:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700131#M757118</link>
      <description>Well, you would definitley want to block port 111 BOTH TCP &amp;amp; UDP to the outside. This is the rpcbind or portmapper port &amp;amp; is used by attackers to determine just what ports your system listens to so that they can use that info against you. &lt;BR /&gt;Since NIS is a rpc-based service this is how they will "probe" you. &lt;BR /&gt;As far as I know there is no one port set for NIS - the client negotiates with the server to determine what port to use &amp;amp; the negotiation starts with port 111.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Tue, 09 Apr 2002 17:30:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700131#M757118</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2002-04-09T17:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700132#M757119</link>
      <description>THis link may help...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x7496abe92dabd5118ff10090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x7496abe92dabd5118ff10090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Tony</description>
      <pubDate>Thu, 11 Apr 2002 19:05:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700132#M757119</guid>
      <dc:creator>Anthony deRito</dc:creator>
      <dc:date>2002-04-11T19:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: NIS security risks</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700133#M757120</link>
      <description>Here are some points of mine:&lt;BR /&gt;&lt;BR /&gt;1. If you do need NIS, use NIS+ if possible&lt;BR /&gt;2. Try convert your system to C2 Trusted System&lt;BR /&gt;3. Ensure that the only machines that have a "+" entry format in the /etc/passwd files are NIS clients, not the NIS master server&lt;BR /&gt;4. use secure RPC.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Apr 2002 00:24:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nis-security-risks/m-p/2700133#M757120</guid>
      <dc:creator>Victor_5</dc:creator>
      <dc:date>2002-04-12T00:24:22Z</dc:date>
    </item>
  </channel>
</rss>

