public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* Re: [OFFTOPIC] Secure network fileserving Linux <-> Linux
@ 2001-09-06 12:28 Jesse Pollard
  2001-09-06 16:41 ` Mike Fedyk
  0 siblings, 1 reply; 17+ messages in thread
From: Jesse Pollard @ 2001-09-06 12:28 UTC (permalink / raw)
  To: dax, Jesse Pollard; +Cc: joe@mathewson.co.uk, linux-kernel@vger.kernel.org

> On Wed, 5 Sep 2001, Jesse Pollard wrote:
> 
> > Third answer:
> >
> > 	A more reasonable way is to configure the user accessable systems as
> > 	just X terminals (no MACs though) on a switched ethernet. Configure
> > 	the switch with	a fixed MAC address for each target (prevents hardware
> > 	substitution). Now you can put the actual user work machines as compute
> > 	servers in a different room. The compute servers (the ones users log
> > 	into) can then use a physically isolated network (users can't plug
> > 	things into it) for NFS to a file server.
> >
> > This is still more extensive (and expensive) than a small lab is usually
> > willing to accept.
> >
> > Fourth answer:
> >
> > 	The minimum would be to use a switched ethernet, with fixed MAC
> > 	addressing. This prevents walk-in users from substituting equipement,
> > 	and it limits the ability to sniff the network. Only packets destined
> > 	for one IP would be visible, and the switch should be able to signal
> > 	an alarm if it detects an unauthorized MAC address (as well as refuse
> > 	to work). This still allows for NFS, and a higher throughput as well
> > 	(each node can use the full bandwidth).
> 
> Both your Third and Fouth answer depend on MAC addresses locked down on
> the switch.  This is fatally flawed since (as the orginal poster pointed
> out), changing your MAC address to match the expected MAC is quite easy.
> 
> # ifconfig eth0 ether A0:B1:C2:D3:E4:F4
> 
> How can you get the expected MAC address?
> 
> 1. Walk up to an allowed computer, unplug computer from wall jack.  Plug
> cross over cable from allowed computer into laptop.  Sniff MAC address
> from frames generated by allowed computer.

or plug in a small hub and sniff valid traffic.

> 	- Reconfigure your eth0 with allowed MAC, plug into network
> 
> 2. Walk up to an allowed computer, unplug computer from wall jack.  Plug
> into wall jack and sniff destination MAC address on frames sent by switch.
> 
> 	- Reconfigure your eth0 with allowed MAC
> 
> 
> One solution is to require layer 2 authentication from the switch, before
> it fowards frames on that port.  Before DHCP.  This process could be
> repeated every time link is lost.  The switch uses RADIUS off of some
> authentication server.

Good point. I didn't think of that one - my environment doesn't require it
(physical security is good here).

> The 802.11x standard(s) implement this for wireless networks, it can also
> be used on wired networks (the specs allow it at least).

I wouldn't want to use 802.11 for much of anything where security is important.
It's just too easy to crack. You also need good physical and OS security
to implement VPNs over wireless.

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

^ permalink raw reply	[flat|nested] 17+ messages in thread
[parent not found: <linux.kernel.20010907025336.D7329@kushida.degree2.com>]
* Re: [OFFTOPIC] Secure network fileserving Linux <-> Linux
@ 2001-09-07 15:34 Jesse Pollard
  2001-09-07 15:58 ` Jamie Lokier
  0 siblings, 1 reply; 17+ messages in thread
From: Jesse Pollard @ 2001-09-07 15:34 UTC (permalink / raw)
  To: lk, Jesse Pollard; +Cc: kubla, joe, linux-kernel

Jamie Lokier <lk@tantalophile.demon.co.uk>:
> Jesse Pollard wrote:
> > > Kerberos won't help either - The only parts of NFS that were kerberized
> > > was the initial mount. Everything else uses filehandles/UDP. Encryption
> > > doesn't help either - slows the entire network down too much.
> > 
> > I disagree! First of all you can always use NFS over TCP, so much for
> > "every thing else uses filehandles/UDP". (No that this improves security,
> > but it can improve reliability!)
> 
> It can improve security if you use NFS over TCP over SSL...
> 
> That may be easier to configure than IPSec in some environments.

I've never seen that used. I assume the procedure is something like:

1. login on client (requires home directory be local)
2. ssh to server (local window for password)
3. user mode mount to another directory (assuming not mounting working
   directory - marked busy, though that might be allowed)
4. use another window for local usage.

	mountd port has to be redirected
	nfsd port(s) have to be redirected (I think, might not apply to server)
	biod port(s) have to be redirected
	lockd port(s) have to be redirected (unless nolocking)
	statd port(s) have to be redirected (not sure)

And only a single user per host (not unreasonable).

Would it also work for windows/Macs?

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

^ permalink raw reply	[flat|nested] 17+ messages in thread
* Re: [OFFTOPIC] Secure network fileserving Linux <-> Linux
@ 2001-09-06 12:46 Jesse Pollard
  2001-09-07  1:53 ` Jamie Lokier
  0 siblings, 1 reply; 17+ messages in thread
From: Jesse Pollard @ 2001-09-06 12:46 UTC (permalink / raw)
  To: kubla, Jesse Pollard; +Cc: joe, linux-kernel

Dominik Kubla <kubla@sciobyte.de>:
On Wed, Sep 05, 2001 at 05:12:48PM -0500, Jesse Pollard wrote:
> 
> Kerberos won't help either - The only parts of NFS that were kerberized
> was the initial mount. Everything else uses filehandles/UDP. Encryption
> doesn't help either - slows the entire network down too much.

I disagree! First of all you can always use NFS over TCP, so much for
"every thing else uses filehandles/UDP". (No that this improves security,
but it can improve reliability!)

Yes - but it won't work in the environment. As you pointed out, it works
under Solaris. No MACs, No Linux, and no MS windows (which would likely be
present in a lab).

Second, without physical security you can't protect the access keys - hence
no kerberos.

-------------------------------------------------------------------------
Jesse I Pollard, II
Email: pollard@navo.hpc.mil

Any opinions expressed are solely my own.

^ permalink raw reply	[flat|nested] 17+ messages in thread
* [OFFTOPIC] Secure network fileserving Linux <-> Linux
@ 2001-09-05 19:13 Joseph Mathewson
  2001-09-05 19:30 ` Fred
                   ` (2 more replies)
  0 siblings, 3 replies; 17+ messages in thread
From: Joseph Mathewson @ 2001-09-05 19:13 UTC (permalink / raw)
  To: linux-kernel

Sorry to ask another annoying question so quickly after my SCSI problems,
but

Does anyone know of/use a secure network filesharing system on a Linux
network?  We currently have a room of about 10 machines, mostly Linux
clients (some MacOS X, soon to come Sun and HP-UX boxes) and servers (all
running Linux).

For some time now, we've been using NFS for filesharing /home and have been
extremely concerned about security.  All the clients in theory run the same
uids/gids, thanks to LDAP, but that doesn't stop someone plugging in an
unauthorized machine and merrily destroying everyone's home directories.

Apparently some work was done to Kerberize various bits of NFS, and Sun
have a secure(r) implementation in Solaris.

Does anyone know of a free (preferably easy :) way of secure Linux <->
Linux filesharing?  Apologies if that seems like a flame, maybe I've missed
the obvious solution.  (Preferably a solution that doesn't involve editing
/etc/exports to only allow connections from specified IPs, because if
someone was going to go to the length of destroying our data, they could
fake that.  Similarly, MAC addresses.)

Joe.

+-------------------------------------------------+
| Joseph Mathewson <joe@mathewson.co.uk>          |
+-------------------------------------------------+

^ permalink raw reply	[flat|nested] 17+ messages in thread

end of thread, other threads:[~2001-09-07 16:09 UTC | newest]

Thread overview: 17+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2001-09-06 12:28 [OFFTOPIC] Secure network fileserving Linux <-> Linux Jesse Pollard
2001-09-06 16:41 ` Mike Fedyk
     [not found] <linux.kernel.20010907025336.D7329@kushida.degree2.com>
2001-09-07 15:41 ` Aaron Denney
  -- strict thread matches above, loose matches on Subject: below --
2001-09-07 15:34 Jesse Pollard
2001-09-07 15:58 ` Jamie Lokier
2001-09-06 12:46 Jesse Pollard
2001-09-07  1:53 ` Jamie Lokier
2001-09-05 19:13 Joseph Mathewson
2001-09-05 19:30 ` Fred
2001-09-05 20:17 ` Frank Schneider
2001-09-05 22:12 ` Jesse Pollard
2001-09-05 22:54   ` Dax Kelson
2001-09-06  1:17   ` John Jasen
2001-09-06  1:54     ` Kain
2001-09-06  3:37     ` Bernd Eckenfels
2001-09-06 12:39       ` Jesse Pollard
2001-09-06  9:20   ` Dominik Kubla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox