[297] in Hesiod

home help back first fref pref prev next nref lref last post

information n hesiod/bind

daemon@ATHENA.MIT.EDU (Doug Lieberman)
Wed Dec 27 02:09:31 1995

From: Doug Lieberman <dlieb@tuna.co.iup.edu>
To: hesiod@MIT.EDU
Date: Wed, 27 Dec 1995 02:07:18 -0500 (EST)

hello, I am a sys admin at the Indiana University of Pennsylvania on a
bunch of Linux boxes and a DEC Ultrix Network.  Anyhjow, the dec netowrk
is all linked using BIND/Kerberos with hesiod class types in the db
files.  Having not set this part up, I am rather confused as to how it
all goes together to get distributed passwords and shadows across the
lan, and I would like to figure it out so I can get the same set up
going on the linux net.  I have read the entire DNS and BIND manual put
out by O'reilly, so I understand that side pretty well.  In the book it
sugested writing email here to find out more info on the Kerberos and
hesiod stuff, so I'm writing this letter.  If you could possibly direct
me toward some literature which would explain this ( any at all would be
nice, all I have found so far is a bunch of literary stuff about HESIOD
) I would be greatly appreciative....

Thank you for your time...

Douglas Lieberman
-- 
***********************************************************************
 Douglas Lieberman                         nlqheya@maple.grove.iup.edu
                   Sys Admin at IUP for:
                     tuna.co.iup.edu
                     goofy.co.iup.edu
                     *.ma.iup.edu
    
             http://www.iup.edu/~nlqheya/index.html

  "Have you ever imagined the world with no hypothetical situations?"
***********************************************************************

home help back first fref pref prev next nref lref last post