The Network File System, or
NFS, is service that provides network
accessible file systems for client machines. For more information on how
NFS works, refer to the chapter titled Network File System
(NFS) in the Red Hat Enterprise Linux Reference Guide. For more
information about configuring NFS, refer to the
Red Hat Enterprise Linux System Administration Guide. The following subsections assume a basic
knowledge of NFS.
| Important |
---|
| The version of NFS included in Red Hat Enterprise Linux, NFSv4, no longer requires the
portmap service as outlined in Section 5.2 Securing Portmap. NFS traffic now utilizes TCP in all
versions, rather than UDP, and requires it when using NFSv4. NFSv4 now
includes Kerberos user and group authentication, as part of the
RPCSEC_GSS kernel module. Information on
portmap is still included, since Red Hat Enterprise Linux
supports NFSv2 and NFSv3 which utilize it.
|
Now that NFSv4 has the ability to pass all information encrypted using
Kerberos over a network, it is important that the service be
configured correctly if it is behind a firewall or on a segmented
network. NFSv2 and NFSv3 still pass data insecurely, and concerns
should be taken into consideration. Careful network design in all of
these regards can help prevent security breaches.
The NFS server determines which file systems to export and which hosts
to export these directories to via the
/etc/exports file. Be careful not to add
extraneous spaces when editing this file.
For instance, the following line in the
/etc/exports file shares the directory
/tmp/nfs/ to the host
bob.example.com with read/write
permissions.
/tmp/nfs/ bob.example.com(rw) |
This line in the /etc/exports file, on the other
hand, shares the same directory to the host
bob.example.com with read-only
permissions and shares it to the world with
read/write permissions due to a single space character after the
hostname.
/tmp/nfs/ bob.example.com (rw) |
It is good practice to check any configured NFS shares by using the
showmount command to verify what is being shared:
By default, NFS shares change the root user to the
nfsnobody user, an unprivileged user account. In this way,
all root-created files are owned by nfsnobody,
which prevents uploading of programs with the setuid bit set.
If no_root_squash is used, remote root users are
able to change any file on the shared file system and leave
trojaned applications for other users to inadvertently execute.