|
|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: R T
Length: 3618 (0xe22)
Types: TextFile
Names: »README.npasswd«
└─⟦4f9d7c866⟧ Bits:30007245 EUUGD6: Sikkerheds distributionen
└─⟦123909933⟧ »./npasswd/npasswd.tar.Z«
└─⟦22a202e7d⟧
└─⟦this⟧ »npass-new/README.npasswd«
@(#)README.npasswd 1.4 9/9/91
To get, compile and install jpl's version of npasswd:
Retrieve files from blacks as follows:
% ftp blacks
FTP> cd /pub/npasswd
FTP> get compile_npasswd
FTP> get install_npasswd
FTP> binary
FTP> get npasswd_jpl.tar.Z
FTP> get wds.all.Z
FTP> quit
Read the scripts compile_npasswd and install_npasswd first.
The default is to put npasswd in /usr/local/npasswd/{bin,adm}.
If you want to change the destination, change DEST in both compile_npasswd
and install_npasswd.
To compile npasswd for your machine, run /bin/csh compile_npasswd.
compile_npasswd uses 'ps ax | grep ypbind' to sense whether to compile the YP
or non-YP version of npasswd. It also uses 'test -d /etc/security' to
sense whether to compile for adjunct passwords.
If you later decide to enable or disable YP or adjunct passwords on your
system, you will need to run compile_npasswd and install_npasswd again.
Sorry about that; maybe somebody else can come up with a better way to do this.
To install it, su root, then run /bin/csh install_npasswd.
This copies it and its data files to DEST, then creates a symbolic
link /usr/ucb/passwd to npasswd, and marks the original passwd non-executable.
If you need to disable npasswd in an emergency, and reenable the
original passwd, su root and execute the command chmod +x /bin/passwd,
then rehash.
The YP version of npasswd can run on the YP master properly only if
you have set up /etc/passwd as if the master was a YP slave, moved
the real passwd file somewhere else, and arranged for yp password updating
(see below).
Warning: if you are using YP, you should choose a difficult-to-guess
domainname, else anyone on the Internet can read your password file.
Sun has had this problem for years, and needs to let system managers
restrict which systems can connect to ypserv.
- Dan Kegel
Appendix - setting up a YP master to have its real password file in
/var/yp/src/passwd. These are approximate directions.
They don't explain how to convert to adjunct passwords; for that, see
blacks:~ftp/pub/shadow/.
Copy /etc/{passwd,group,...} to /var/yp/src, deleted all lines with +.
Change /var/yp/Makefile to use /var/yp/src:
# Dan Kegel's changes
#DIR =/etc
DIR =/var/yp/src
#ALIASES = /etc/aliases
ALIASES = /var/yp/src/aliases
# End of Dan Kegel's changes
Modify /var/yp/updaters to reference files in /var/yp/src rather than /etc:
# where the NIS files live
#DIR=/etc
DIR=/var/yp/src
Add lines to /etc/rc to invoke yppasswdd:
# YP password daemon; allows remote setting of passwords
if [ -f /usr/etc/rpc.yppasswdd ]; then
if [ -f /var/yp/src/security/passwd.adjunct ]; then
/usr/etc/rpc.yppasswdd \
/var/yp/src/passwd \
/etc/security/passwd.adjunct \
-nogecos -noshell -m passwd \
DIR=/var/yp/src; echo 'NIS Password daemon'
else
/usr/etc/rpc.yppasswdd \
/var/yp/src/passwd \
-nogecos -noshell -m passwd \
DIR=/var/yp/src; echo 'NIS Password daemon'
fi
fi
Modify /etc/passwd to refer to NIS for everything except username,
and to disallow all users not specifically listed. (I keep a root
password here just in case YP gets lost, too.) i.e. 1st two entries are
root:fRbKXFe65D2.s:0:1:Operator:/:/bin/csh
nobody:*:65534:65534::/:
every user has a line of form
+username:
and last entry is
+:*:65534:65534::/tmp:/bin/true
to recognize all other accounts but prevent them from logging in.
The script blacks:~ftp/pub/npasswd/add_user+ automatically modifies /etc/passwd
and /var/yp/passwd when you use it to create a new account, and lets you set
initial password too.