On 11/5/2018 2:32 PM, Grant Taylor via TUHS wrote:

NIS+ was encrypted over the network, and needed a public key mechanism to authenticate clients. One of which was the server itself. With it's hierarchical architecture, it had a lot of flexibility.

The encryption would thwart snooping.  But it doesn't sound like that would prevent a properly authenticated client from ypcating too much information.
Unless someone already replied and I didn't read it yet:

NIS/YP is different than NIS+. NIS/YP is the old protocol. You could basically bind to any server with the correct domain name, and look at all the maps including passwd with it's encrypted passwords.

NIS+ is the hierarchical, encrypted, clients-need-keys, protocol.

Almost two entirely different things. And "almost" is more like 99.99999999999999999% different :)

ak