In a message dated: Fri, 17 Mar 2000 11:57:49 EST
Bob Bell said:

>Paul Lussier wrote:
>
>> Well, yes and no.  You don't want anyone to be able to 'ypcat shadow' for
>> example, then you're right back to where we are now.  You need to be able to
>> have clients authenticate against the shadow file somehow, so I suppose all
>> authentication requests could be sent to the NIS server, which could then do
>> the lookup, responding either yes or no.
>
>http://www.linuxdoc.org/HOWTO/NIS-HOWTO-6.html#ss6.8

Err, what's your point?  Isn't that what I just said?
-- 
Seeya,
Paul
----
         Doing something stupid always costs less (up front)
                  than doing something intelligent.
  A conclusion is simply the place where you got tired of thinking.
         If you're not having fun, you're not doing it right!



**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************

Reply via email to