Re: NIS or not?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hello Sorin,

Good call - not sure how far your coding goes and with what/how 
languages and scripts...
Make sure to have as much as possible on VM's related to your security 
'servers' -- so
that you also get a virtual built in Disaster recovery as well.

KERBEROS is a very secure, albeit cumbersome component to implement (// 
network wide // think of... )

Having said this, um, with the tools available with openSource.. and I'm 
assuming you're such a shop
due to running CentOS -- you can customize the ticket transport aspect 
after the encrypted
authentication token is created and 'capture' that and with some slight 
tweaks create your
own 'virtual Federated' auth method by way having total control of your 
requests, successes, failures and
the like.

Note: I didn't catch it are you using the Microsoft's implementation of 
Kerberos?
There's a reason I ask, you said you need to do something,, sounds like 
fairly quick, probably a good thing,
if nothing else get centralization = control! - more so -- than before ~ 
and so it goes, you will have encapsulated
tickets on steroids, to be sure.. but if you're the only person.. is 
your shop that big that SSL wouldn't do the trick?
with some slight coding and enhancements // customization // - usually 
not supported by a 'given vendor' so
beware there...

You will see performance over the other solutions in this space and some 
scalability - without know 'a lot' about your
infrastructure -- and appliances therefore entered into the equation - 
it's hard to really say.

But sounds like you have Unix/Linux backend and alot of Windows stuff 
(we can't seem to ever get away from the
highly faulty Windows suite) -- maybe when I retire, but anyway, and 
you're probably hitting a few AD servers --
and therefore there is the rub.

I have some implementations of several solutions if you're really 
serious about this as I can strip out the
confidential stuff (I do weird things for various 'friendly' 
governments, world-wide) and have seen
a thing or two here... mostly what 'not to do..'

Watch out for the posers out there as they will fire off the first thing 
from their minds and usually because they
do not know much and end up with a flame or such ~ rarely a thank you..

In any event, I offer this as is and hope you enjoy your career with 
security.
It truly is the highest paying area of IT at this given time.. I don't 
care what anyone says.

Think of the Target stores out there and such.. and you'll see SECURITY 
all over 2014  and more.
We most don't get it.. They do a VISIO chart and build a server and 
usually *uck it up worse than ever.

GOOD LUCK. CentOS - is awesome for this kind of thing as a back-end and 
front-end.
ENCIRCLE your WINDOWS servers and crush them! heh.

~ good night.

Oh summary:

KERBEROS good for larger scale operations that need total control and 
performance for many up-calls and down-calls
NTLM - um, don't do it.
SSL - vxx - ~! you can do this -- with customization - the rub here is 
customization means little if any support,
if you leave, the 'company' is toast, in many cases.. there are no 
'upgrades' to security with an ENHANCEMENT
or customization.. and so it goes, you own it, until you die or leave...

Some experience for you here. Lots of it. Tons of it.

Okay.. I did my community service for the day.

Wizard of Hass!

On 1/29/2014 12:11 AM, Sorin Srbu wrote:
>> -----Original Message-----
>> From: centos-bounces@xxxxxxxxxx [mailto:centos-bounces@xxxxxxxxxx] On
>> Behalf Of Jeffrey Hass
>> Sent: den 29 januari 2014 08:47
>> To: CentOS mailing list
>> Subject: Re:  NIS or not?
>>
>> Hi friend -
>>
>> what is your end goal with this effort to obtain security with your
>> nodes over the 'wire' -
>>
>> there are some other solutions -- kerberos is now used heavily by
>> microsoft so that's enough to make me
>> run for the hills... just saying..
>>
>> i've set up other solutions to be sure -- even against the blasted (not
>> a real LDAP) AD.
>>
>> anyway.. just some thoughts... it's not trivial. any of the solutions, btw.
>> not at all..
>>
>> j/h
>> San Francisco/Holland/Saudi Arabia
> Primarily to enable less administration in the long run with centralized
> logins, instead of keeping each single client updated with respect to shadow,
> passwd, bashrc, hosts and so on.
>
> Some sort of encryption would probably be wise to use, as NIS uses clear text
> passwords. I don't trust our university network that much, even though the
> traffic should pretty localized.
>
> I'm aware that setting up Kerberos probably will be a big project,
> nevertheless, we must do something about the current mess. As I'm the single
> sysadmin at the department, my time is finite. Automation is good, but as I
> wrote before, regular bash-scripting (however powerful) will only take you so
> far. 8-/
> --
> //Sorin
>
>
> _______________________________________________
> CentOS mailing list
> CentOS@xxxxxxxxxx
> http://lists.centos.org/mailman/listinfo/centos

_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos




[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux