In a message dated: Fri, 17 Mar 2000 11:57:49 EST
Bob Bell said:
>Paul Lussier wrote:
>
>> Well, yes and no. You don't want anyone to be able to 'ypcat shadow' for
>> example, then you're right back to where we are now. You need to be able to
>> have clients authenticate against the shadow file somehow, so I suppose all
>> authentication requests could be sent to the NIS server, which could then do
>> the lookup, responding either yes or no.
>
>http://www.linuxdoc.org/HOWTO/NIS-HOWTO-6.html#ss6.8
Err, what's your point? Isn't that what I just said?
--
Seeya,
Paul
----
Doing something stupid always costs less (up front)
than doing something intelligent.
A conclusion is simply the place where you got tired of thinking.
If you're not having fun, you're not doing it right!
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************