From owner-freebsd-questions@FreeBSD.ORG Sun Dec 14 08:36:11 2003 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id BD53916A4CE for ; Sun, 14 Dec 2003 08:36:11 -0800 (PST) Received: from mail.seekingfire.com (coyote.seekingfire.com [24.72.10.212]) by mx1.FreeBSD.org (Postfix) with ESMTP id 3AC2143D31 for ; Sun, 14 Dec 2003 08:36:10 -0800 (PST) (envelope-from tillman@seekingfire.com) Received: by mail.seekingfire.com (Postfix, from userid 500) id 17C93D4; Sun, 14 Dec 2003 10:36:07 -0600 (CST) Date: Sun, 14 Dec 2003 10:36:06 -0600 From: Tillman Hodgson To: freebsd-questions@freebsd.org Message-ID: <20031214163606.GQ64340@seekingfire.com> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Habeas-SWE-1: winter into spring X-Habeas-SWE-2: brightly anticipated X-Habeas-SWE-3: like Habeas SWE (tm) X-Habeas-SWE-4: Copyright 2002 Habeas (tm) X-Habeas-SWE-5: Sender Warranted Email (SWE) (tm). The sender of this X-Habeas-SWE-6: email in exchange for a license for this Habeas X-Habeas-SWE-7: warrant mark warrants that this is a Habeas Compliant X-Habeas-SWE-8: Message (HCM) and not spam. Please report use of this X-Habeas-SWE-9: mark in spam to . X-GPG-Key-ID: 828AFC7B X-GPG-Fingerprint: 5584 14BA C9EB 1524 0E68 F543 0F0A 7FBC 828A FC7B X-GPG-Key: http://www.seekingfire.com/gpg_key.asc X-Urban-Legend: There is lots of hidden information in headers User-Agent: Mutt/1.5.5.1i Subject: Re: NIS authontication problem. X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 14 Dec 2003 16:36:11 -0000 On Sun, Dec 14, 2003 at 06:13:39PM -0500, Hossein wrote: > Hello every body; > In our department we are going to use a 5.1 Stable FreeBSD, and it > must run NIS client to authonticate the users through a Linux NIS server. > The ypbind works well and when I do "ypcat passwd" I get the > enteries in the passwd of the NIS server. I added the correct lines to > passwd.master and group according to the handbook. But no user can log in > and in the /var/log/auth.log it apears that the password is not corect. I haven't tried integrating non-BSD'ish machines into one of my NIS domains, but it occurs to me that the /etc/shadow vs /etc/master.passwd difference could cause /etc/passwd to propogate without actually distributing the passwords. You might want to investigate "compatibility" modes and so forth. -T -- Speak the truth. That is always much easier, and is often the most powerful argument. - Bene Gesserit Axiom