Skip to main content

Discuss security issues in Network File system.

71.Discuss security issues in Network File system.
Ans.
1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network.

2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible.

3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control.

4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts.

5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted.

6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security.

7. Netfilter is stronger than NFS daemon level security or even TCP wrappers because it restricts access to your server at the packet level.

8. mountd, lockd, statd and rquotad do not bind to any specific port i.e. they use a port number randomly assigned by the portampper.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Explain process of setting up a NIC (Network interface card).

44.Explain process of setting up a NIC (Network interface card). Ans. 1. Network interface card (NIC) can be set-up by configuring the network card and internal network. 2. Before configuring network card we must check loopback (IP address 127.0.0.1) is working. 3. Even if the compute is not connected to outside network internet network configuration is required for some applications. This address is known as loopback device, and its IP address is 127.0.0.1 4. To check loopback device is configured or not, we use ‘ifconfig’ command it shows a device called ‘lo’ with the address 127.0.0.1, if this device and address is not shown there then loopback is not configured. 5. To configure it we can use command ifconfig lo 127.0.0.1 after that we need to use the ‘route’ command to give system a little more information about this interface for this ‘route add –net 127.0.0.0’ command is used, after this loopback is setup. 6. To configure a network card we will use ifconfig co...