>
> I don't know how exactly his configuration works, but FWIW if you're
> using shadow passwords from a Solaris server, a user cannot ypcat
> passwd.adjunct, only root can.

Of course, this was the purpose of shadow passwords. The shadow password system
don't allow ordinary users to read the passwd file, so they won't be able to hack
it.
See: man 5 passwd
Even an ordinary user on a local machine can't read the /etc/shadow file.

> And if you're going to authenticate
> users from a central service on the network, be it NIS or anything
> else, how can you prevent the sniffing problem? Short of using
> something totally different a la Kerberos, you can't. (Am I right that
> Kerberos uses a challenge-response scheme that alleviates the sniffing
> problem?)
>


=================================================================
To unsubscribe, send mail to [EMAIL PROTECTED] with
the word "unsubscribe" in the message body, e.g., run the command
echo unsubscribe | mail [EMAIL PROTECTED]

Reply via email to