Skip to main content

List all the Network file system (NFS) scripts.

63.List all the Network file system (NFS) scripts.
Ans.
1. sync – It forces NFS server to perform disk write operation before informing client that request is complete.

2. async – It makes NFS server to cache disk write operation.

3. hide – It hides subdirectory of an exported file system.

4. nohide – It unhide subdirectory of an exported file system.

5. ro – It gives read only access to clients who has mounted the exports.

6. rw – It fives read/write access to clients who has mounted the exports.

7. root_squash – It prevents root user on an NFS client from having root privileges on NFS server.

8. no_root_squash – It disables root_squash.

9. secure – It accepts only if generating from port numbers less than 1024.

10. insecure – It accepts client’s request even if generating from port numbers higher than 1024.

11. secure_blocks – It requires clients to be authenticated who request for lock operation.

12. insecure_locks – It doesn’t require clients to be authenticated who request for lock operations.

13. subtree_check – It ensures only a part of filesystem is exported and file requests apply to files in the exported portion of the file system.

14. no_subtree_check – It disables subtree_check.
Two additional configuration files if you’re using NFSv4

15. /etc/gssapi_mech.conf – It implemets NFSv4 features. It controls gss daemon one need the information to configure secure RPC. It needs no modification.

16. /etc/idmapd.conf – It is idmapd daemon. It translates NFSv4 IDs to user and group.

Comments

Popular posts from this blog

Java,ES,QT practical files

All practical files: Click below to start download Uploaded on special request||||

Vidyalankar Question paper solutions

Download from their website: http://www.vidyalankar.org/index.aspx or just click here to download

Discuss security issues in Network File system.

71.Discuss security issues in Network File system. Ans. 1. NFS protocol version 3 and older have some security problems that make it unsuitable for use across the Internet and potentially unsafe for use even in trusted network. 2. One NFS weakness, in general terms, is the /etc/exports file, if a cracker is able to spoof or take over a trusted address, an address listed in /etc/exports then your exported NFS mount are accessible. 3. NFS has normal Linux file system access controls that take over once a client has mounted an NFS export, once this happens normal user and group permissions on the files take over access control. 4. The 1st way to defense is to use host access control, to limit access to services , particularly the portmapper, which has long been target of exploits attempts. 5. For this add the entries in /etc/hosts.clevy lockd, statd, mountd and rquoted. 6. Careful use of IS packet firewall, using netfilter, dramatically increases NFS server security. ...