blob: 0ac6774a1ff29f012efaec9c4be1fcc3b83da7e8 [file] [log] [blame]
lh9ed821d2023-04-07 01:36:19 -07001# /etc/default/nss
2# This file can theoretically contain a bunch of customization variables
3# for Name Service Switch in the GNU C library. For now there are only
4# four variables:
5#
6# NETID_AUTHORITATIVE
7# If set to TRUE, the initgroups() function will accept the information
8# from the netid.byname NIS map as authoritative. This can speed up the
9# function significantly if the group.byname map is large. The content
10# of the netid.byname map is used AS IS. The system administrator has
11# to make sure it is correctly generated.
12#NETID_AUTHORITATIVE=TRUE
13#
14# SERVICES_AUTHORITATIVE
15# If set to TRUE, the getservbyname{,_r}() function will assume
16# services.byservicename NIS map exists and is authoritative, particularly
17# that it contains both keys with /proto and without /proto for both
18# primary service names and service aliases. The system administrator
19# has to make sure it is correctly generated.
20#SERVICES_AUTHORITATIVE=TRUE
21#
22# SETENT_BATCH_READ
23# If set to TRUE, various setXXent() functions will read the entire
24# database at once and then hand out the requests one by one from
25# memory with every getXXent() call. Otherwise each getXXent() call
26# might result into a network communication with the server to get
27# the next entry.
28#SETENT_BATCH_READ=TRUE
29#
30# ADJUNCT_AS_SHADOW
31# If set to TRUE, the passwd routines in the NIS NSS module will not
32# use the passwd.adjunct.byname tables to fill in the password data
33# in the passwd structure. This is a security problem if the NIS
34# server cannot be trusted to send the passwd.adjuct table only to
35# privileged clients. Instead the passwd.adjunct.byname table is
36# used to synthesize the shadow.byname table if it does not exist.
37#ADJUNCT_AS_SHADOW=TRUE