This file is indexed.

/usr/lib/tiger/doc/nfs.html is in tiger 1:3.2.3-10.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

  1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
<HR><PRE>








</PRE><HR>
<CENTER><H2> Documents for nfs</H2></CENTER>
<A NAME="nfs001f"><P><B>Code [nfs001f]</B><P>
The anonymous ID defines the 'uid' to be used for authenticating
NFS requests which have no credentials. Setting this to 0 is
very dangerous. It allows the system to be compromised from client
machines.
<PRE>










</PRE><HR>
<A NAME="nfs002w"><P><B>Code [nfs002w]</B><P>
The anonymous ID defines the 'uid' to be used for authenticating
NFS requests which have no credentials. Setting this to 0 is
very dangerous. It allows all files to be searched, possibly
revealing security problems.
<PRE>










</PRE><HR>
<A NAME="nfs003w"><P><B>Code [nfs003w]</B><P>
Exporting the root file-system allows remote machines to
access critical files such as /etc/passwd, possibly allowing
the machine to be compromised.
<PRE>










</PRE><HR>
<A NAME="nfs004f"><P><B>Code [nfs004f]</B><P>
Exporting the root file system allows remote machines to
access critical file such as /etc/passwd. Exporting this
R/W to everyone means that on the Internet can modify system
files, allowing them to gain further access to the machine.
<PRE>










</PRE><HR>
<A NAME="nfs005f"><P><B>Code [nfs005f]</B><P>
Exporting the root file system allows remote machines to
access critical file such as /etc/passwd. Exporting this
to everyone means that anyone on the Internet can browse system
files, allowing them to find other security problems.
<PRE>










</PRE><HR>
<A NAME="nfs006f"><P><B>Code [nfs006f]</B><P>
Exporting a file-system R/W to everyone means that anyone can
modify the data on your system, possibly making changes that
allow them to login to the system and access or destroy other
files.
<P>
See `nfs013i'
<PRE>










</PRE><HR>
<A NAME="nfs007w"><P><B>Code [nfs007w]</B><P>
Exporting a directory to everyone means that anyone can
look at your files. The information gained can possibly
be used to gain further access to the machine.
<P>
See `nfs013i'
<PRE>










</PRE><HR>
<A NAME="nfs008f"><P><B>Code [nfs008f]</B><P>
Exporting the root file system read only and with root access
will allow the remote machine to view system files,
possibly allowing them to gain further access to the
machine.
<PRE>










</PRE><HR>
<A NAME="nfs009f"><P><B>Code [nfs009f]</B><P>
Exporting the root file system with R/W and root access
will allow the remote machine to edit system files,
such as /etc/passwd, allowing them to gain access to the
machine.
<PRE>










</PRE><HR>
<A NAME="nfs010i"><P><B>Code [nfs010i]</B><P>
Exporting a file-system with root access can allow the
a user on the remote host to gain further access on
the local machine. Removing root exports is a means
of limiting the number of affected machines in the
event that a machine(s) is compromised. In this case,
the directory is protected on the server because the
permissions are '700'. Note on some platforms, if this
is not the root directory of a file-system, then the
server may still be vulnerable.
<PRE>










</PRE><HR>
<A NAME="nfs011w"><P><B>Code [nfs011w]</B><P>
The listed directory is exported with root access to a
machine, and the directory is accessible on the server.
By setting the permissions to 'rwx------', if the client is
compromised, the server can not be compromised by any files
which are placed underneath this directory, since they will
be unreachable by a non-privileged user on the server.
Note on some platforms, if this is not the root directory
of a file-system, then the server may still be vulnerable.
<P>
<PRE>










</PRE><HR>
<A NAME="nfs012w"><P><B>Code [nfs012w]</B><P>
The directory for a disk-less client is exported with
root access, but the directory is not protected on the
server because the permissions are not '700'. By setting
the permissions of the directory to `700', any files created
from the client machine will not be accessible on the server.
Note on some platforms, if this is not the root directory
of a file-system, then the server may still be vulnerable.
<P>
NOTE: For the disk-less clients '/' (root) directory, the
permissions can *not* be `700' as non-root processes on the
client will not be able to access any files. The permissions
on the parent directory on the server should be set to `700'
(or if feasible, the root directory of the file-system on which
the directory resides should be set to `700').
<PRE>










</PRE><HR>
<A NAME="nfs013i"><P><B>Code [nfs013i]</B><P>
A common problem with setting up NFS exports is the inability
to get the client access to work. Often, in frustration,
the administrator of the machine removes the export restrictions
and exports the file systems to everyone. This problem is
usually caused by host name mismatches. On most implementations
of NFS, the name matching is case sensitive. The name specified
in the exports file (or equivalent) must match exactly. One
way of determining the correct name is to login to the client,
then use `telnet' to login to the server. The `who' or `finger'
command can then be used to determine the client host name (it
may be truncated, but enough information should be listed to
determine the correct name). This host name should be used in
the access list in the exports file.
<PRE>










</PRE><HR>
<A NAME="nfs014w"><P><B>Code [nfs014w]</B><P>
Exporting the `/usr' partition with read/write access can allow
the server to be compromised if the client is compromised. An
intruder can replace system binaries. By exporting it read/only,
they will be unable to do this.