Skip to main content

Discuss security issues in Network File system.

71.Discuss security issues in Network File system.
Ans.
1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network.

2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible.

3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control.

4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts.

5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted.

6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security.

7. Netfilter is stronger than NFS daemon level security or even TCP wrappers because it restricts access to your server at the packet level.

8. mountd, lockd, statd and rquotad do not bind to any specific port i.e. they use a port number randomly assigned by the portampper.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Absolute Links vs. Relative Links – SEO Value

Absolute Links vs. Relative Links – SEO Value The debate between  absolute links and relative links  continues to live on in the SEO world. The individual significance of each has been contested, but it is widely regarded that absolute links provide better SEO value on the whole than relative links. Many believe that absolute links have less potential for getting messed up when search engines index your page. It shouldn’t really make a difference, but many conclude that this is reason enough. Read more...

Explain network classes.

43.Explain network classes. Ans. 1. TCP/IP network are 4 bytes long, called IP addresses and written in dotted-decimal notation. (ex. 192.168.166.5) 2. The decimal numbers must be within the numeric range of 0-255, each IPv4 addresses consist of 4 parts. 3. Each part should conform to the 1-byte requirement. 4. Depending on the value of the first byte of the address, IP addresses can be divided into classes. 5. Network classes are of 3 type and have some specific range • Class A 0-127 • Class B 128-191 • Class C 192-233 6. Class division enables us efficient use of the address numbers. 7. Assigned network numbers are maintained in a database managed by InterNIC to insure that each assignment is unique. 8. After obtaining a network number, the host numbers may be assigned as required, for data transfer ARP maps the IP address to the MAC address of the device. 9. Routers are used for transferring data between 2 devices, routers are default gateway ...