On 11/5/2018 2:32 PM, Grant Taylor via TUHS wrote:
NIS+ was encrypted
over the network, and needed a public key mechanism to
authenticate clients. One of which was the server itself. With
it's hierarchical architecture, it had a lot of flexibility.
The encryption would thwart snooping. But it doesn't sound like
that would prevent a properly authenticated client from ypcating
too much information.
Unless someone already replied and I didn't read it yet:
NIS/YP is different than NIS+. NIS/YP is the old protocol. You could
basically bind to any server with the correct domain name, and look
at all the maps including passwd with it's encrypted passwords.
NIS+ is the hierarchical, encrypted, clients-need-keys, protocol.
Almost two entirely different things. And "almost" is more like
99.99999999999999999% different :)
ak