Cover V05, I01
Article
Figure 1
Figure 2
Sidebar 1
Sidebar 2
Sidebar 3

jan96.tar


Sidebar: I Can't Run NIS and NIS+!

Although the NFS automounter was designed to work in an NIS environment, it does not require NIS. In the ridiculous extreme, if you can't run NIS, you could edit automounter maps from scratch on each NFS client. Before you do that, take a look at some of the alternative ways to push automounter maps and other administrative information around. The trick is to get the automounter maps, user information (/etc/passwd), and group information (/etc/group) out to the client machines. Since you probably want your users to be able to change their password on any machine, your NIS replacement should include a way to get user information flowing in both directions.

So in traditional UNIX style, if you can't use NIS, you could build your own network information system. To start with, ask a few important questions. What do you need to distribute? How often do changes need to be distributed? How fast must they be distributed? If speed and scalability are not deciding factors, the simplest way to push automounter maps may be to use rdist. rdist (remote distribution) is a program to maintain identical copies of files over multiple hosts. It ships with almost all UNIX operating systems, and it is simple to use. To make use of rdist, you could create a set of automounter maps on a central trusted host. When you wanted to propagate a changed map, you would edit the central copy and invoke rdist to push the changes out. (Your changes, however, won't take effect until the next time the machine is rebooted.) There is a version of rdist that has been completely rewritten by Michael Cooper (see ftp://usc.edu/pub/rdist.) It includes several extensions to the classic rdist, and does not need to run from a trusted host as root. For more on rdist, see Judith Ashworth's "rdist to the Rescue," Sys Admin 1.4, Nov/Dec 1992.)

While you're connected to the ftp server at UCS, pick up your replacement for the password portion of NIS. Michael Cooper has also written a drop-in replacement for the NIS password system; "System for Password Management (SPM)," pronounced "spam" (ftp://usc.edu/pub/spm). His system includes a demon for centralized password management, and a set of client programs for changing passwords. For some shops, a combination of rdist and SPM may be a good fit, if all you need to do is push automounter maps and manage user passwords. NIS can be a great asset, but it can be overkill if your needs are modest.

A work-alike to rdist is Carnegie Mellon's SUP (Software Upgrade Protocol). SUP has traditionally been used to keep software developers synchronized, but is an excellent candidate for synchronizing automounter maps. Take a look at

ftp://ftp.cs.cmu.edu/project/mach/sup.

For the Cadillac of password and user information systems, you might try Hesiod and kerberos. Hesiod is a generic distributed information system based on the Domain Name Service (DNS). It was created as part of project ATHENA at MIT. It can be used for all kinds of data, including user names and passwords. Kerberos is a "network authentication system." Kerberos is too big a product to discuss here. To find out more about it take a look at

ftp://athena-dist.mit.edu/pub/kerberos

Kerberos is also available commercially. If you have not seen kerberos since version 4, you might want to take another look at version 5.