Practical UNIX and Internet Security, 3rd Edition
by Simson Garfinkel, Gene Spafford, Alan Schwartz
Chapter 14: Network-Based Authentication Systems
Don’t use your Internet domain name as your NIS domain.
Use NIS+ instead of NIS, if possible. Don’t run NIS+ in compatibility mode.
Use netgroups to restrict access to services, including login.
Make sure that your version of ypbind listens only on privileged ports.
Make sure that there is an asterisk (*) in the password field of any line beginning with a plus sign (+) in both the passwd and group files of any NIS client.
Make sure that there is no line beginning with a plus sign (+) in the passwd or group files on any NIS server.
If you are using Kerberos, understand its limitations. Protect the Kerberos controller at all costs.
If you are using LDAP for authentication, secure connections with TLS/SSL.
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access