NFS Mounts in Trusted Extensions
NFS mounts in Trusted Extensions are similar to Solaris mounts. The differences occur
in the use of zone root pathnames when mounting a labeled zone in
Trusted Extensions, and in the enforcement of MAC policy.
NFS shares in Trusted Extensions are similar to Solaris shares in a global
zone. However, the sharing of files from a labeled zone on a
multilevel system is unique to Trusted Extensions:
Shares and mounts in the global zone – Sharing and mounting files in the global zone of a Trusted Extensions system is almost identical to the procedure in the Solaris OS. For mounting files, the automounter, the vfstab file, and the mount command can be used. For sharing files, the dfstab file is used.
Mounts in labeled zones – Mounting files in labeled zones in Trusted Extensions is almost identical to mounting files in non-global zones in the Solaris OS. For mounting files, the automounter, the vfstab file, and the mount command can be used. In Trusted Extensions, a unique automount_home_label configuration file exists for each labeled zone.
Shares in labeled zones – Files in a labeled zone can be shared at the label of the zone by using a dfstab file that is at the label of the zone, but is visible to the global zone only. So, configuring a labeled zone to share files is performed by the global zone administrator in the global zone. This configuration file is not visible from its labeled zone. For more discussion, see Global Zone Processes and Labeled Zones.
Labels affect which files can be mounted. Files are shared and mounted at
a particular label. For a Trusted Extensions client to write to a
file that is NFS-mounted, the file must be mounted with read/write permissions and
be at the same label as the client. If you are mounting
a file between two Trusted Extensions hosts, the server and the client must
have compatible remote host templates of type cipso. If you are mounting a file
between a Trusted Extensions host and an unlabeled host, files that are at
the single label that is specified for the unlabeled host in the
tnrhdb file can be mounted. Files that are mounted with LOFS can
be viewed, but cannot be modified. For details on NFS mounts, see Access to NFS Mounted Directories in Trusted Extensions.
Labels also affect which directories and files can be viewed. By default, lower-level
objects are available in a user's environment. Therefore, in the default configuration, a
regular user can view files that are in a zone at a lower
level than the user's current level. For example, users can see their lower-level
home directories from a higher label. For details, see Home Directory Creation in Trusted Extensions.
If site security forbids the viewing of lower-level objects, you can make lower-level
directories invisible to the user. For details, see How to Disable the Mounting of Lower-Level Files.
The mount policy in Trusted Extensions has no MAC overrides. Mounted files that
are visible at a lower label can never be modified by a
higher-label process. This MAC policy is also in effect in the global zone.
A global zone ADMIN_HIGH process cannot modify an NFS-mounted file at a
lower label, such as a PUBLIC file or an ADMIN_LOW file. MAC policies enforce
the default configuration and are invisible to regular users. Regular users cannot see
objects unless they have MAC access to them.