From: Jamie Lokier <lk@tantalophile.demon.co.uk>
To: Jesse Pollard <pollard@tomcat.admin.navo.hpc.mil>
Cc: kubla@sciobyte.de, joe@mathewson.co.uk, linux-kernel@vger.kernel.org
Subject: Re: [OFFTOPIC] Secure network fileserving Linux <-> Linux
Date: Fri, 7 Sep 2001 16:58:52 +0100 [thread overview]
Message-ID: <20010907165852.B8956@kushida.degree2.com> (raw)
In-Reply-To: <200109071534.KAA90220@tomcat.admin.navo.hpc.mil>
In-Reply-To: <200109071534.KAA90220@tomcat.admin.navo.hpc.mil>; from pollard@tomcat.admin.navo.hpc.mil on Fri, Sep 07, 2001 at 10:34:12AM -0500
Jesse Pollard wrote:
> > It can improve security if you use NFS over TCP over SSL...
> > That may be easier to configure than IPSec in some environments.
>
> I've never seen that used. I assume the procedure is something like:
>
> 1. login on client (requires home directory be local)
> 2. ssh to server (local window for password)
Or you can use the `openssl' program.
> 3. user mode mount to another directory (assuming not mounting working
> directory - marked busy, though that might be allowed)
> 4. use another window for local usage.
>
> mountd port has to be redirected
> nfsd port(s) have to be redirected (I think, might not apply to server)
Really, the only critical one if you're worried about people
reading/writing your data is nfsd. mountd is second most important, but
not really if you're using the user-space NFS server.
> biod port(s) have to be redirected
No need for biod.
> lockd port(s) have to be redirected (unless nolocking)
> statd port(s) have to be redirected (not sure)
I'm not sure about statd either. It would be safest to run this over SSL.
> And only a single user per host (not unreasonable).
You could have multiple users per host, with appropriate funky mounts so
each user can only access their own secure mounts. Either mount in a
subdirectory of a user-private directory, or use the Plan9-style
per-user mount trees (experimental patches from Al Viro).
> Would it also work for windows/Macs?
If you put a Linux box in between to implement the SSL part :-)
It's pretty complicated, but then even a simple port-based firewall is
rather complicated with NFS.
Now, if somebody were to fix the portmapper and RPC libraries to use
sensible fixed ports, so we could sensibly firewall RPC services, they
might be tempted to implement automatic SSL tunnelling while they're
there...
-- Jamie
next prev parent reply other threads:[~2001-09-07 15:59 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2001-09-07 15:34 [OFFTOPIC] Secure network fileserving Linux <-> Linux Jesse Pollard
2001-09-07 15:58 ` Jamie Lokier [this message]
[not found] <linux.kernel.20010907025336.D7329@kushida.degree2.com>
2001-09-07 15:41 ` Aaron Denney
-- strict thread matches above, loose matches on Subject: below --
2001-09-06 12:46 Jesse Pollard
2001-09-07 1:53 ` Jamie Lokier
2001-09-06 12:28 Jesse Pollard
2001-09-06 16:41 ` Mike Fedyk
2001-09-05 19:13 Joseph Mathewson
2001-09-05 19:30 ` Fred
2001-09-05 20:17 ` Frank Schneider
2001-09-05 22:12 ` Jesse Pollard
2001-09-05 22:54 ` Dax Kelson
2001-09-06 1:17 ` John Jasen
2001-09-06 1:54 ` Kain
2001-09-06 3:37 ` Bernd Eckenfels
2001-09-06 12:39 ` Jesse Pollard
2001-09-06 9:20 ` Dominik Kubla
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20010907165852.B8956@kushida.degree2.com \
--to=lk@tantalophile.demon.co.uk \
--cc=joe@mathewson.co.uk \
--cc=kubla@sciobyte.de \
--cc=linux-kernel@vger.kernel.org \
--cc=pollard@tomcat.admin.navo.hpc.mil \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox