In article <[EMAIL PROTECTED]>,
James G. Stallings II <[EMAIL PROTECTED]> wrote:
>I've been trying to establish an environment similiar to what I support
>at work, wherein numerous UNIX boxen on a trusted network are granted
>unauthenticated (transparent, even) rsh/rlogin perms and user writable
>NFS volumes, via autofs and NIS. As I understand the current level of
>maturity with respect to the Linux codebase, the code for autofs (and
>perhaps NIS/NFS as well), does not work properly yet with shadow
>passwords
AFAIK NFS and autofs don't have anything to do with shadow passwords
or in fact any password file at all, right?
NIS does have to do with it, but if you're using a recent GNU libc
(aka libc6) NIS will work fine with shadow passwords.
>and as a result things are ro (and therefor broken) where
>they should be rw.
As I said autofs and NFS don't know about passwords. It mus be
somethin else - did you export the filesystems (rw,no_root_squash) ?
>So, this brings to mind: Dumb question #64322: how
>can I back out shadow passwords? I am running x86 boxen with debian 2.0
>(hamm) - all packages installed via dselect.
Oh, that's easy - "shadowconfig off".
Mike.
--
Indifference will certainly be the downfall of mankind, but who cares?
-
To unsubscribe from this list: send the line "unsubscribe linux-net" in
the body of a message to [EMAIL PROTECTED]