On 11/5/2018 2:32 PM, Grant Taylor via TUHS wrote: > >> NIS+ was encrypted over the network, and needed a public key >> mechanism to authenticate clients. One of which was the server >> itself. With it's hierarchical architecture, it had a lot of >> flexibility. > > The encryption would thwart snooping.  But it doesn't sound like that > would prevent a properly authenticated client from ypcating too much > information. Unless someone already replied and I didn't read it yet: NIS/YP is different than NIS+. NIS/YP is the old protocol. You could basically bind to any server with the correct domain name, and look at all the maps including passwd with it's encrypted passwords. NIS+ is the hierarchical, encrypted, clients-need-keys, protocol. Almost two entirely different things. And "almost" is more like 99.99999999999999999% different :) ak