HostedDB - Dedicated UNIX Servers

-->
Securing NIS

Securing NIS (formerly YP)

_Image_

The following is a brief compendium of what we at Auburn Univeristy College of Engineering use to secure our NIS networks. We have a mix of about 65% NIS, 35% NIS+ network that is seeded from NIS -> NIS+ via periodic cron jobs. The following is our implementation of securing NIS using various vendor patches and free utilities from around the world.

NIS has a reputation of being extremely insecure. If you implement these steps it will lose most if not all of the reasons for this, and you will retain all the administrative advantages of NIS without any of the security risks. We only have experience implementing this with SunOS4.1.X, since we use NIS+ on Solaris 2.X machines and since we are a predominantly Sun shop. All other machines may have slightly different results and implementations. Hopefully others will find this useful, though. Here's a list of reasons why you should follow these steps.

  1. People can grab your password map from any machine in the world and crack on it remotely.
  2. It disables several of the holes found by Satan.
  3. Local people can use ypcat to grab all the encrypted passwords and crack on them.
  4. Remote people can grab any map in your NIS domain. Some of these may have confidential information.



Related Documents