TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [TCLUG:8633] NIS, shadow, and in-secure networks
Quoting Christopher Palmer (reid@pconline.com):
> On Sun, 26 Sep 1999, Bob Tanner wrote:
>
> > If possible, I'd rather send shadow across the network because snooping a
> > network is slightly more challenging then grabing /etc/passwd and brute
> > force attacking it.
>
> Can you tunnel NIS through SSH?
Maybe, I was looking at sslwrap <http://www.rickk.com/sslwrap/> and stunnel
<http://mike.daewoo.com.pl/computer/stunnel/>, but I am not 100% sure they
will work with NIS.
--
Bob Tanner <tanner@real-time.com> | Phone : (612)943-8700
http://www.real-time.com | Fax : (612)943-8500
Key fingerprint = 6C E9 51 4F D5 3E 4C 66 62 A9 10 E5 35 85 39 D9