]> git.ipfire.org Git - thirdparty/glibc.git/blame - nis/nss
Set reasonable limits for xdr_requests.
[thirdparty/glibc.git] / nis / nss
CommitLineData
e98fb1a6
UD
1# /etc/default/nss
2# This file can theoretically contain a bunch of customization variables
4eaa9bb4 3# for Name Service Switch in the GNU C library. For now there are only
71170aa0 4# four variables:
e98fb1a6
UD
5#
6# NETID_AUTHORITATIVE
0fce3070 7# If set to TRUE, the initgroups() function will accept the information
e98fb1a6
UD
8# from the netid.byname NIS map as authoritative. This can speed up the
9# function significantly if the group.byname map is large. The content
10# of the netid.byname map is used AS IS. The system administrator has
11# to make sure it is correctly generated.
12#NETID_AUTHORITATIVE=TRUE
0fce3070
UD
13#
14# SERVICES_AUTHORITATIVE
15# If set to TRUE, the getservbyname{,_r}() function will assume
16# services.byservicename NIS map exists and is authoritative, particularly
17# that it contains both keys with /proto and without /proto for both
18# primary service names and service aliases. The system administrator
19# has to make sure it is correctly generated.
20#SERVICES_AUTHORITATIVE=TRUE
4eaa9bb4
UD
21#
22# SETENT_BATCH_READ
23# If set to TRUE, various setXXent() functions will read the entire
24# database at once and then hand out the requests one by one from
25# memory with every getXXent() call. Otherwise each getXXent() call
26# might result into a network communication with the server to get
27# the next entry.
28#SETENT_BATCH_READ=TRUE
71170aa0
UD
29#
30# ADJUNCT_AS_SHADOW
31# If set to TRUE, the passwd routines in the NIS NSS module will not
32# use the passwd.adjunct.byname tables to fill in the password data
33# in the passwd structure. This is a security problem if the NIS
34# server cannot be trusted to send the passwd.adjuct table only to
35# privileged clients. Instead the passwd.adjunct.byname table is
36# used to synthesize the shadow.byname table if it does not exist.
37#ADJUNCT_AS_SHADOW=TRUE