TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [TCLUG:8633] NIS, shadow, and in-secure networks



Quoting Christopher Palmer (reid@pconline.com):
> On Sun, 26 Sep 1999, Bob Tanner wrote:
> 
> > If possible, I'd rather send shadow across the network because snooping a
> > network is slightly more challenging then grabing /etc/passwd and brute
> > force attacking it.
> 
> Can you tunnel NIS through SSH?

Maybe, I was looking at sslwrap <http://www.rickk.com/sslwrap/> and stunnel
<http://mike.daewoo.com.pl/computer/stunnel/>, but I am not 100% sure they
will work with NIS. 
-- 
Bob Tanner <tanner@real-time.com>       | Phone : (612)943-8700
http://www.real-time.com                | Fax   : (612)943-8500
Key fingerprint =  6C E9 51 4F D5 3E 4C 66 62 A9 10 E5 35 85 39 D9