Post #148,233
3/24/04 5:21:52 PM
|
Oh but you are a meanie, nothing you can do about it.
I used SunOS not Solaris, but I assume them to be about the same. If like SunOS, then it is a routing table in the etc directory. My best guess would be a *gateways file. In case of Solaris it would be tsolgateways. If one does not exist, then defaultrouter would be used instead.
NIS+, I assume you mean Network Information Services. NIS+ supports the passwd.adjunct map, very simular to the etc/shadow method. /etc/nsswitch.conf gets changed after ypserv and ypbind are started. The process will have to be restarted. Using etc/shadow to create the passwd-map will not work properly. $PWDIR/security/passwd.adjunct should be used instead. Still there are problems and a non-shadowed password file may have to be created to get around this.
But I admit I am a bit rusty and have not used these skills since 1997/1998.
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|
Post #148,245
3/24/04 5:48:12 PM
|
You've googled.
You lose. :-)
Peter [link|http://www.debian.org|Shill For Hire] [link|http://www.kuro5hin.org|There is no K5 Cabal] [link|http://guildenstern.dyndns.org|Blog]
|
Post #148,256
3/24/04 6:04:30 PM
|
tad obvious I would say :-)
In Bush\ufffds America, fighting terrorism abroad is used as a pretext for vanquishing civil liberties at home. David Podvin questions, help? [link|mailto:pappas@catholic.org|email pappas at catholic.org]
|
Post #148,259
3/24/04 6:07:38 PM
|
To a genuine UNIX admin, yes.
To Norm, no.
Peter [link|http://www.debian.org|Shill For Hire] [link|http://www.kuro5hin.org|There is no K5 Cabal] [link|http://guildenstern.dyndns.org|Blog]
|
Post #148,307
3/24/04 7:57:58 PM
|
So you say
and I knew you would say that no matter what I posted.
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|
Post #148,347
3/24/04 9:26:27 PM
|
In that, you're almost definitely wrong
Without googling, the following should be obvious to any admin.
Shadowed passwords exist as a way to do local authentication with the password not stored in the publically readable passwd file.
NIS exists as a way to centralize authentication across many systems. It moves password checking to a remote system.
The answer that would have suggested that you actually understood what was going on would be to point out that the purpose of shadowed passwords and NIS contradict each other. You either check passwords locally or remotely. Changing how you do it locally when the data is remote is pointless.
The worst possible answer would be to supply large amounts of gratuitous detail (of exactly the kind that you can Google for) without indicating any conceptual grasp of what is going on.
And that is what you did.
Regards, Ben
"good ideas and bad code build communities, the other three combinations do not" - [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
|
Post #148,351
3/24/04 9:30:18 PM
|
actually you can do both
If I am local to the box I can have a shadowed passwd and a different NIS passwd and flag which to use. An example of such is recovery of a root passwd when an admin has been removed and the NIS maintainers cannot be reached in an emergency. thanx, bill
In Bush\ufffds America, fighting terrorism abroad is used as a pretext for vanquishing civil liberties at home. David Podvin questions, help? [link|mailto:pappas@catholic.org|email pappas at catholic.org]
|
Post #148,356
3/24/04 9:36:54 PM
|
I was wondering about that...
My assumption was that Peter was right in [link|http://z.iwethey.org/forums/render/content/show?contentid=148144|http://z.iwethey.org...?contentid=148144] that the two couldn't be used at the same time. Bad assumption, but I didn't claim to be an admin. (Quite the contrary in fact.)
Also it is still true that they can't be used at the same time on the same account. And that is true for exactly the reason that I gave.
Cheers, Ben
"good ideas and bad code build communities, the other three combinations do not" - [link|http://archives.real-time.com/pipermail/cocoon-devel/2000-October/003023.html|Stefano Mazzocchi]
|
Post #148,430
3/25/04 1:57:09 AM
|
I should have been more specific.
Sorry for any confusion.
The point stands, though.
Peter [link|http://www.debian.org|Shill For Hire] [link|http://www.kuro5hin.org|There is no K5 Cabal] [link|http://guildenstern.dyndns.org|Blog]
|
Post #148,394
3/24/04 10:50:56 PM
|
PAM does that too, IIRC
You set the rules to look in NIS first, local second.
Regards,
-scott anderson
"Welcome to Rivendell, Mr. Anderson..."
|
Post #148,414
3/24/04 11:55:04 PM
|
That is the way I do things
The worst possible answer would be to supply large amounts of gratuitous detail (of exactly the kind that you can Google for) without indicating any conceptual grasp of what is going on.
I always supply large amounts of gratuitous detail without indicating any conceptual grasp of what is going on. Stream of unending conscience and all that, you know. ;) Obviously you have not paid attention to any of my posts for the past 6 years or however long I have been posting them as. If I googled it would have been word for word and explained it better than I explained it. But I have been branded as a Googler, and I hate Google with a passion and do not want to use it. I have stated that before, and I am only repeating myself yet again to someone who obviously did not pay attention to my previous posts. So you and Peter can have your reality on that. I don't care what you two think anymore.
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|
Post #148,632
3/25/04 8:22:18 PM
|
There are ways to actually have both.
But as you pointed out this is typically a stupid thing.
Reasons being sometimes an alternate authentication system needs to be defined to guarantee access to remote systems even when the primary and perhaps secondary authentication systems are unavailable.
But, given that now a days there are other ways to get access (RIB Boards, Remote KVMs etc...) this makes entirely ZERO sense.
-- [link|mailto:greg@gregfolkert.net|greg], [link|http://www.iwethey.org/ed_curry|REMEMBER ED CURRY!] @ iwethey
'In view of the fact that Microsoft is acondemned monopolist and on the other hand the internal messages andfinancial transactions of SCO look ever doubtful, Microsoft should bereally anxious that to the own company something does not remainsticking from the Gestank of the SCO.' --Plagarized from [link|http://www.groklaw.net/article.php?story=20040322133607169|GROKLAW]
|
Post #148,348
3/24/04 9:26:54 PM
|
Norm there was enough misinformation in yer post
to indicate that you read it but didnt understand it. thanx, bill
In Bush\ufffds America, fighting terrorism abroad is used as a pretext for vanquishing civil liberties at home. David Podvin questions, help? [link|mailto:pappas@catholic.org|email pappas at catholic.org]
|
Post #148,415
3/24/04 11:56:37 PM
|
There is always Misinformation in my posts
or haven't you been paying attention to my posts either?
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|
Post #148,460
3/25/04 8:23:11 AM
|
You claim you didnt lookup the answers
the answer you gave indicated that you read the material you posted but didnt understand it. You could not have remembered this because it never worked that way. So you checked online and posted what you thought were the answers, no biggie, we all do that. But quit protesting that you didnt. thanx, bill
In Bush\ufffds America, fighting terrorism abroad is used as a pretext for vanquishing civil liberties at home. David Podvin questions, help? [link|mailto:pappas@catholic.org|email pappas at catholic.org]
|
Post #148,603
3/25/04 6:43:29 PM
|
Fine if it shuts you up
I did lookup the answers. The Internet is a very valuable research tool, and I cannot understand why using it to find something or verify something is seen as a bad thing. No different than reading a book.
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|
Post #148,635
3/25/04 8:30:20 PM
|
Actually you are correct.
But you said you were qualified.
You lease on being qualified as an Admin is up... you forgot to pay the rent about 5 years ago.
Give up trying to impress us. You will never Measure up, with you lame attempts to install linux and now accidentally stumble upon answers that you should ALSO found on the internet.
You claim the Internet is a resource, you never used it before to fix your issues with learning linux, why should you start now, just to prove our point for us.
You are absolutely a person that has some understanding of things, but you run out of steam very quickly as you use the whole thing up.
Please stop this, it garners no respect or good reputation.
-- [link|mailto:greg@gregfolkert.net|greg], [link|http://www.iwethey.org/ed_curry|REMEMBER ED CURRY!] @ iwethey
'In view of the fact that Microsoft is acondemned monopolist and on the other hand the internal messages andfinancial transactions of SCO look ever doubtful, Microsoft should bereally anxious that to the own company something does not remainsticking from the Gestank of the SCO.' --Plagarized from [link|http://www.groklaw.net/article.php?story=20040322133607169|GROKLAW]
|
Post #149,966
4/4/04 12:24:51 PM
|
I did fix my Linux problems on my own
thank you very much. I am reading Howtos and FAQs to get what I can out of them.
True I never was able to reach my potential, I have too many walls in my way to reach it.
"Lady I only speak two languages, English and Bad English!" - Corbin Dallas "The Fifth Element"
|