Installation guide

the maps if the login notication comes from a Version 4.0D client.
Therefore, the yppush operation is only completed when an older client
initiates the operation or when it is necessary to clear a failed login count.
Sites that cannot use NIS to share prpasswd information may be able to
use NFS to share the /tcb/files and /var/tcb/files directories
instead. This requires you to export the directories with root access to the
participating nodes (with root=0 or
root=client1:client2:client3 as appropriate). It also
requires you to enable NFS locking to ensure that no database corruption
occurs. For more information, see the exports(4) reference page.
In previous releases of the operating system, NIS slaves that were listed in
the ypservers NIS map on the NIS master but that did not already have a
copy of the prpasswd and prpasswd_nonsecure NIS maps may not
have succeeded in transferring those maps during the yppush operation.
This problem has been xed for Version 4.0D and higher.
4.3.7.2 Disaster Recovery
Because the user prole and tty information is now stored in database les,
the previous recovery method of editing the les while in single-user mode is
no longer available. However, as long as the /usr (and, if separate, /var)
le systems are mounted, you can use the edauth utility in single-user
mode to edit extended proles and ttys database entries.
If the /etc/passwd le is somehow lost, but the extended proles are still
available, then you can use a command sequence as in the following example
to recover some of the missing data (the "\" characters indicate line
continuation):
# bcheckrc
# /tcb/bin/convuser -dn | /usr/bin/xargs /tcb/bin/edauth -g | \
sed /:u_id#/!d;s/.*:u_name=//;s/:u_id#/:*:/;s/:u_.*$/:/\
>psw.missing
This will create a psw.missing le containing entries like the following:
root:*:0:
Primary group information, nger information, home directory, and login
shell are not recorded in the extended prole. You must recover the data for
those elds by other means.
4.3.7.3 The pw_id_map and gr_id_map Files Are Obsolete
The Enhanced Security routines pw_idtoname, pw_nametoid,
gr_idtoname, and gr_nametoid (described in pw_mapping(3))
previously used the /etc/auth/system/pw_id_map and
/etc/auth/system/gr_id_map les to nd the required information
for mapping names to numeric identiers, and vice versa. The disk space
418 Base System Software Notes