2.8 Disable NIS Client Services - nis client

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

If the local site is not using the NIS naming service to distribute system and user
configuration information, this service may be disabled. This service is disabled by default
unless the NIS service has been installed and configured on the system.

Rationale:

As RPC-based services such as NIS may use non-secure authentication and share sensitive
network object information with systems and applications using RPC-based service, NIS
client daemons should be disabled. Users are encouraged to use LDAP as a name service in
place of NIS.

Solution

To disable this service, run the following commands:

# svcadm disable svc:/network/nis/client

Check to see if LDAP Client is in use:

# svcs -a | grep ldap | awk -F" " '{if ($1 ~ /disabled/ && $3 ~ /client/)
print "LDAP Client is disabled - svc:/network/nfs/domain can be disabled.";}'

If LDAP is not in use also disable nis/domain:

# svcadm disable svc:/network/nis/domain

See Also

https://workbench.cisecurity.org/files/2582