Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 Nov 1996 10:01:16 -0500
From:      jc@irbs.com (John Capo)
To:        gpalmer@freebsd.org (Gary Palmer)
Cc:        jbh@netpci.com (Justin Harvey), michael@memra.com (Michael Dillon), freebsd-isp@freebsd.org
Subject:   Re: Stupid question no 10101
Message-ID:  <Mutt.19961120100116.jc@irbs.com>
In-Reply-To: <7065.848474532@orion.webspan.net>; from Gary Palmer on Nov 20, 1996 02:22:12 -0500
References:  <Pine.BSF.3.91.961115145434.23937D-100000@delenn.netpci.com> <7065.848474532@orion.webspan.net>

next in thread | previous in thread | raw e-mail | index | archive | help
Quoting Gary Palmer (gpalmer@freebsd.org):
> 
> Try sharing your password file with NIS. Basically, if you use plain
> old NIS, it publishes your password file (or at least the passwords of
> your users) to anyone who cares to look (I've been told that there is
> some program called `ypghost' which lets people do this). I, for one,
> don't want my users passwords disseminated to anyone who wants an easy
> back-door into our system.
> 

ypghost works by having access to the wire via bpf.

    http://tachyon.mono.org/~arny/progs/ypghost/WHATISTHIS

Ypxfr can snarf a password file too if it is running as root and
the server is not protected via filters and/or tcp_wrappers.  Access
to the wire is not needed.

> (and, yes, I have thought of using an access list (aka packet filter)
>  on our Cisco gateway, but access lists can be bypassed, and it still
>  leaves it open to all our shell users).

FreeBSD NIS will not deliver master.passwd.* to a request from a
unpriviledged port.  Ypserv can be complied to use tcp_wrappers
also.  Your shell users would have to have root or find another
hole via a setuid root program.

If your wire is not secure and you are not filtering at a router
then copying the password file via an encrypted link is your only
option.

John Capo




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Mutt.19961120100116.jc>