Solved

Different between NIS and Kerberos

Posted on 2010-09-08
4
414 Views
Last Modified: 2012-05-10
hi all,

I have setup NIS to enable used to login to NIS servers. I so some article saying NIS is not secure. Can I use it with Kerberos to authenticate user or Kerberos is used separately (as server and client)?

thanks
0
Comment
Question by:rawandnet
  • 2
  • 2
4 Comments
 
LVL 10

Expert Comment

by:Martin_J_Parker
ID: 33625857
NIS is not considered very secure and it is incompatible with a lot of other products.
Here's an old document about NIS security: http://www.eng.auburn.edu/~doug/nis.html

NIS is being less used these days.  It's a throwback to older UNIX systems.
NIS was supposed to be replaced with NIS+, but that was never very popular because it was such a pain to set up and maintain, so both versions are still supported.

Rather than using NIS, LDAP with Kerberos is growing in popularity, and LDAP does have some Microsoft Windows Server support:
http://technet.microsoft.com/en-us/library/cc750824.aspx

Here is a doc on replacing NIS with LDAP and Kerberos.
http://www.ofb.net/~jheiss/krbldap/howto.html

If you want to continue with NIS, it would probably be worth looking at the O'Reilly NIS book:
http://docstore.mik.ua/orelly/networking_2ndEd/nfs/index.htm
In chapter 12 that talks about using Kerberos V5 for NFS mounts.

Luckily for me I've only got a few Linux users so I don't need anything so complicated!  :-)
0
 

Author Comment

by:rawandnet
ID: 33625997

client and server is linux redhat, if i use kerberos server does it do same as NIS for connecting kerberos client? does is has to be LDAP? do you know any site for step-by-step of configuring keberos?
0
 
LVL 10

Accepted Solution

by:
Martin_J_Parker earned 500 total points
ID: 33626087
I don't think it has to be LDAP - it's just newer and more secure.
I assume the Kerberos client is for accessing NFS disks?  
0
 

Author Closing Comment

by:rawandnet
ID: 33700040
thanks
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question