Skip to main content

List and explain all the status files in NFS.

64.List and explain all the status files in NFS.
Ans.
1. /var/lib/nfs.rmtab – It list each NFS export that is mounted by an NFS client. It uses the Daemon rpc.mountd since it is responsible for servicing the request to mount NFS exports.
Whenever , rpc.mounted daemon receives request, it adds an entry into /var/lib/nfs/rmtab. The same goes for unmounts request but in that case entry is removed from status file.

2. /var/lib/nfs/etab – It contains list of currently exported filesystem, the exportfs command maintains the entries in this file.

3. These three scripts which are initialized and controls the required NFS server daemons /etc/rc.d/init.d/portmap
/etc/rc.d/init.d/nfs
/etc/rc.d/init.d/nfslock

4. The portmap scripts starts the portmap daemon also called as portmapper. All programs that uses RPC, such as NIS and NFS, depends on the information the portmapper provides.

5. The primary NFS startup script is /etc/rc.d/init.d/nfs, It requires single argument. E.g. start, stop, restart or reloaded. These commands are executed as follows:
#service nfs status
#service nfs stop
#service nfs start
#service nfs restart
#service nfs reload

6. NFS service also requires the file locking daemons lockd and statd. Lockd is started automatically but statd is started separately. To carry out this process initialization script can also be useful i.e. /etc/rc.d/init.d/nfslock

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...