/usr/lib/tiger/doc/nfs.html is in tiger 1:3.2.3-10.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 | <HR><PRE>
</PRE><HR>
<CENTER><H2> Documents for nfs</H2></CENTER>
<A NAME="nfs001f"><P><B>Code [nfs001f]</B><P>
The anonymous ID defines the 'uid' to be used for authenticating
NFS requests which have no credentials. Setting this to 0 is
very dangerous. It allows the system to be compromised from client
machines.
<PRE>
</PRE><HR>
<A NAME="nfs002w"><P><B>Code [nfs002w]</B><P>
The anonymous ID defines the 'uid' to be used for authenticating
NFS requests which have no credentials. Setting this to 0 is
very dangerous. It allows all files to be searched, possibly
revealing security problems.
<PRE>
</PRE><HR>
<A NAME="nfs003w"><P><B>Code [nfs003w]</B><P>
Exporting the root file-system allows remote machines to
access critical files such as /etc/passwd, possibly allowing
the machine to be compromised.
<PRE>
</PRE><HR>
<A NAME="nfs004f"><P><B>Code [nfs004f]</B><P>
Exporting the root file system allows remote machines to
access critical file such as /etc/passwd. Exporting this
R/W to everyone means that on the Internet can modify system
files, allowing them to gain further access to the machine.
<PRE>
</PRE><HR>
<A NAME="nfs005f"><P><B>Code [nfs005f]</B><P>
Exporting the root file system allows remote machines to
access critical file such as /etc/passwd. Exporting this
to everyone means that anyone on the Internet can browse system
files, allowing them to find other security problems.
<PRE>
</PRE><HR>
<A NAME="nfs006f"><P><B>Code [nfs006f]</B><P>
Exporting a file-system R/W to everyone means that anyone can
modify the data on your system, possibly making changes that
allow them to login to the system and access or destroy other
files.
<P>
See `nfs013i'
<PRE>
</PRE><HR>
<A NAME="nfs007w"><P><B>Code [nfs007w]</B><P>
Exporting a directory to everyone means that anyone can
look at your files. The information gained can possibly
be used to gain further access to the machine.
<P>
See `nfs013i'
<PRE>
</PRE><HR>
<A NAME="nfs008f"><P><B>Code [nfs008f]</B><P>
Exporting the root file system read only and with root access
will allow the remote machine to view system files,
possibly allowing them to gain further access to the
machine.
<PRE>
</PRE><HR>
<A NAME="nfs009f"><P><B>Code [nfs009f]</B><P>
Exporting the root file system with R/W and root access
will allow the remote machine to edit system files,
such as /etc/passwd, allowing them to gain access to the
machine.
<PRE>
</PRE><HR>
<A NAME="nfs010i"><P><B>Code [nfs010i]</B><P>
Exporting a file-system with root access can allow the
a user on the remote host to gain further access on
the local machine. Removing root exports is a means
of limiting the number of affected machines in the
event that a machine(s) is compromised. In this case,
the directory is protected on the server because the
permissions are '700'. Note on some platforms, if this
is not the root directory of a file-system, then the
server may still be vulnerable.
<PRE>
</PRE><HR>
<A NAME="nfs011w"><P><B>Code [nfs011w]</B><P>
The listed directory is exported with root access to a
machine, and the directory is accessible on the server.
By setting the permissions to 'rwx------', if the client is
compromised, the server can not be compromised by any files
which are placed underneath this directory, since they will
be unreachable by a non-privileged user on the server.
Note on some platforms, if this is not the root directory
of a file-system, then the server may still be vulnerable.
<P>
<PRE>
</PRE><HR>
<A NAME="nfs012w"><P><B>Code [nfs012w]</B><P>
The directory for a disk-less client is exported with
root access, but the directory is not protected on the
server because the permissions are not '700'. By setting
the permissions of the directory to `700', any files created
from the client machine will not be accessible on the server.
Note on some platforms, if this is not the root directory
of a file-system, then the server may still be vulnerable.
<P>
NOTE: For the disk-less clients '/' (root) directory, the
permissions can *not* be `700' as non-root processes on the
client will not be able to access any files. The permissions
on the parent directory on the server should be set to `700'
(or if feasible, the root directory of the file-system on which
the directory resides should be set to `700').
<PRE>
</PRE><HR>
<A NAME="nfs013i"><P><B>Code [nfs013i]</B><P>
A common problem with setting up NFS exports is the inability
to get the client access to work. Often, in frustration,
the administrator of the machine removes the export restrictions
and exports the file systems to everyone. This problem is
usually caused by host name mismatches. On most implementations
of NFS, the name matching is case sensitive. The name specified
in the exports file (or equivalent) must match exactly. One
way of determining the correct name is to login to the client,
then use `telnet' to login to the server. The `who' or `finger'
command can then be used to determine the client host name (it
may be truncated, but enough information should be listed to
determine the correct name). This host name should be used in
the access list in the exports file.
<PRE>
</PRE><HR>
<A NAME="nfs014w"><P><B>Code [nfs014w]</B><P>
Exporting the `/usr' partition with read/write access can allow
the server to be compromised if the client is compromised. An
intruder can replace system binaries. By exporting it read/only,
they will be unable to do this.
|