From owner-freebsd-isp Tue Apr 1 17:45:20 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id RAA23968 for isp-outgoing; Tue, 1 Apr 1997 17:45:20 -0800 (PST) Received: from spooky.eis.net.au (spooky.eis.net.au [203.12.171.2]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id RAA23961 for ; Tue, 1 Apr 1997 17:45:15 -0800 (PST) Received: (from ernie@localhost) by spooky.eis.net.au (8.8.5/8.8.5) id LAA06116; Wed, 2 Apr 1997 11:42:05 +1000 (EST) From: Ernie Elu Message-Id: <199704020142.LAA06116@spooky.eis.net.au> Subject: Re: NIS In-Reply-To: from Justen Stepka at "Apr 1, 97 07:05:52 pm" To: raistlin@ecp.net (Justen Stepka) Date: Wed, 2 Apr 1997 11:42:05 +1000 (EST) Cc: freebsd-isp@freebsd.org X-Mailer: ELM [version 2.4ME+ PL31 (25)] MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: owner-isp@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > > I would personaly run FreeBSD on all the machines because if you want to > export the shadow stuff it's insecure and your users will be able to see > the passwd feild. FreeBSD's NIS is like SunOS in that the passwd feild is > not shown with any ypcat map. > > Thanks for the suggestion, I would love to have all the machines on FreeBSD but I have to leave the terminal servers running Linux use the transparent proxy feature of the Linux kernel to save users having to set the proxy server in their browser. Despite lots of prodding, I found that only 40% of users were setting proxies and at $0.19c per MB inbound traffic in Australia, proxies are a must. I grabbed the DES stuff and installed it, haven't figured out how to build the password database on the FreeBSD box from the password files on the linux box but a bit more reading should have that under control. So the question is how to make the most secure NIS set up between the Linux boxes and the FreeBSD ypserv machine? - Ernie.