48.2.3.2. Use a Password-like NIS Domain Name and Hostname


Any machine within an NIS domain can use commands to extract information from the server without authentication, as long as the user knows the NIS server's DNS hostname and NIS domain name.
For instance, if someone either connects a laptop computer into the network or breaks into the network from outside (and manages to spoof an internal IP address), the following command reveals the /etc/passwd map:
ypcat -d <NIS_domain> -h <DNS_hostname> passwdypcat -d <NIS_domain> -h <DNS_hostname> passwdypcat -d <NIS_domain> -h <DNS_hostname> passwdypcat -d <NIS_domain> -h <DNS_hostname> passwdypcat -d <NIS_domain> -h <DNS_hostname> passwd
Copy to Clipboard Toggle word wrap
If this attacker is a root user, they can obtain the /etc/shadow file by typing the following command:
ypcat -d <NIS_domain> -h <DNS_hostname> shadowypcat -d <NIS_domain> -h <DNS_hostname> shadowypcat -d <NIS_domain> -h <DNS_hostname> shadowypcat -d <NIS_domain> -h <DNS_hostname> shadowypcat -d <NIS_domain> -h <DNS_hostname> shadow
Copy to Clipboard Toggle word wrap

Note

If Kerberos is used, the /etc/shadow file is not stored within an NIS map.
To make access to NIS maps harder for an attacker, create a random string for the DNS hostname, such as o7hfawtgmhwg.domain.com. Similarly, create a different randomized NIS domain name. This makes it much more difficult for an attacker to access the NIS server.
Voltar ao topo
Red Hat logoGithubredditYoutubeTwitter

Aprender

Experimente, compre e venda

Comunidades

Sobre a documentação da Red Hat

Ajudamos os usuários da Red Hat a inovar e atingir seus objetivos com nossos produtos e serviços com conteúdo em que podem confiar. Explore nossas atualizações recentes.

Tornando o open source mais inclusivo

A Red Hat está comprometida em substituir a linguagem problemática em nosso código, documentação e propriedades da web. Para mais detalhes veja o Blog da Red Hat.

Sobre a Red Hat

Fornecemos soluções robustas que facilitam o trabalho das empresas em plataformas e ambientes, desde o data center principal até a borda da rede.

Theme

© 2025 Red Hat