![]() | ![]() |
The local file is checked first, but there is no UID 11461 in it. However, /etc/nsswitch.conf has this entry:root:passwd:0:1:Operator:/:/bin/csh daemon:*:1:1::/: sys:*:2:2::/:/bin/csh bin:*:3:3::/bin: uucp:*:4:8::/var/spool/uucppublic:
which effectively appends the entire NIS password map. getpwuid( ) decides it needs to go to NIS for the password file entry.passwd: files nis
appear on the console as ypbind continues looking for a server. At this point, the NIS client is only partially functional; any process that needs information from an NIS map will wait on the return of a valid domain binding. Most processes need to check permissions using UIDs, find a hostname associated with an IP address, or make some other reference to NIS-managed data if they are doing anything other than purely CPU-bound work. A machine using NIS will not run for long once it loses its binding to an NIS server. It remains partially dead until a server appears on the network and answers ypbind 's broadcast requests for service. The need for reliable NIS service cannot be stressed enough. In the next chapter, we'll look at ways of using and configuring the service efficiently.NIS server not responding for domain "nesales"; still trying
![]() | ![]() | ![]() |
3.3. Files managed under NIS | ![]() | 4. System Management Using NIS |
Copyright © 2002 O'Reilly & Associates. All rights reserved.