Re: Hardening NIS+From: Neil Dickey (firstname.lastname@example.org)
- Previous message: Crist J. Clark: "Re: Solaris and lack of loopback routes"
- Maybe in reply to: Small, Jim: "Hardening NIS+"
- Next in thread: Darren Moffat: "Re: Hardening NIS+"
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] [ attachment ]
Date: Fri, 9 Aug 2002 15:05:37 -0500 (CDT) From: Neil Dickey <email@example.com> To: firstname.lastname@example.org, email@example.com
"Small, Jim" <firstname.lastname@example.org> wrote asking:
>Has anyone seen any articles/papers on hardening/locking down NIS+?
Someone will doubtless correct me if I'm wrong, but it's my understanding
that NIS+ is very secure "as is." The only exception arises if it is run
in YP-compatible mode. There are vulnerabilities associated with that,
but we don't do it and I don't recall what they are.
Neil Dickey, Ph.D.
Northern Illinois University