- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: NIS security risks
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 09:27 AM
04-09-2002 09:27 AM
NIS security risks
What are the most weak features for security on NIS?
and
How can I mitigate the security risks?
Does HP have a procedure to do it?
I will appreciatte your comments.
regards.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 09:32 AM
04-09-2002 09:32 AM
Re: NIS security risks
The biggest hole in NIS is probably the lack of a shadow passwd file. If someone can do a 'ypcat passwd > myfile' the hashed passwords are visible. A user can then use a utility like 'crack' to attempt to find the plaintext passwd by comparing the hashed versions to those in 'myfile'.
Your workarounds are 1) go to NIS+ 2) ensure that your passwds are very6 difficult to crack by build a more robust version of the yppasswd command.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 09:55 AM
04-09-2002 09:55 AM
Re: NIS security risks
Definitely agree w/Clay!
No shadow file = easier to crack.
If you have to use NIS you should use NIS+ & I would recommend the further step of NIS+ under a Trusted System (C2) `.
See the following URL for info & instrs on setting up NIS+ under a Trusted System.
http://docs.hp.com/hpux/onlinedocs/B2355-90742/B2355-90742.html
HTH,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 09:55 AM
04-09-2002 09:55 AM
Re: NIS security risks
NIS is not that much secure as you can compare with system without NIS.
If you need security as well as NIS set up, then it is a great thing you can go ahead with NIS+ set up.
NIS+ is quite different than NIS but if you follow step by step procedure in HP's manual about NIS+ setup, you can do great. NIS+ can be set up on trusted systems as well to enhance security.
Looking to your case, you need to go for NIS+, it gives high security and not an easy task to break the NIS+ security.
-pap
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 10:06 AM
04-09-2002 10:06 AM
Re: NIS security risks
However, before go to NIS+ as a solution; I will keep using NIS. I need to know what are the risk outside the NIS? I know anyone inside NIS can read a map; but I'm thinking about external attacks (using sniffer, etc.. Do you know something like restrict port access, etc...something avoiding he map-read from outside.
Again, I'll appreciate your comments.
Tx.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-09-2002 10:30 AM
04-09-2002 10:30 AM
Re: NIS security risks
Since NIS is a rpc-based service this is how they will "probe" you.
As far as I know there is no one port set for NIS - the client negotiates with the server to determine what port to use & the negotiation starts with port 111.
Rgds,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2002 12:05 PM
04-11-2002 12:05 PM
Re: NIS security risks
http://forums.itrc.hp.com/cm/QuestionAnswer/1,11866,0x7496abe92dabd5118ff10090279cd0f9,00.html
Tony
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-11-2002 05:24 PM
04-11-2002 05:24 PM
Re: NIS security risks
1. If you do need NIS, use NIS+ if possible
2. Try convert your system to C2 Trusted System
3. Ensure that the only machines that have a "+" entry format in the /etc/passwd files are NIS clients, not the NIS master server
4. use secure RPC.