NFS security

NFS security

Postby morgano » Jan 19th, '13, 17:21

Currently i have a simple file server sharing files using plain NFS
Access is granted/denied only by IP number
File permissions if i understand correctly are governed only on the client side. (works but i have not testef forging)

It is working; on clients i set computer IP manually, and registers users and their user and group ID numbers the same on all computers.

But on the server i have half-sensitive info, and also clients files that i promised to protect.
So i encrypt the disks and of course the wireless LAN

So it just do not feel OK that it is possible for "anyone" to look at network traffic, and set IP like a granted computer and read files.
Maybe i should set file permissions 640 so user need to have any correct group or user id even for reading, and use unusual group and user ID numbers.
But it is not "water tight" and i have no idea how to maintain all applications for all users create files with 640 permissions.

NFSv4 have many functions, among them i want to utilise:
grant users securely using Kerberos
encrypt all traffic
improved buffering of several sorts

I just can not find a clear simple guide how to set up and learn to use Kerberos for this single use.. anyone can give a hint?

Or anyone have an alternate idea

I also want it to time out and later automount after hibernation/reboot/being off network as several are laptops, and i also want it to work without hickups when switcing between wireless and wired network, thus changing IP "on the fly"

I want to implement this sometime before summer when i make a new server running mga3

For company and even family use i think reliable and validated secured file server is important, so this *should* be made easy to implement....
At home & work Mandriva since 2006, Mageia 2011. Thinkpad T40, T43, T60, T400, T510, Dell M4400, M6300, Acer Aspire 7. Workstation using LVM, LUKS, VirtualBox, BOINC
morgano
 
Posts: 1489
Joined: Jun 15th, '11, 17:51
Location: Kivik, Sweden

Re: NFS security

Postby wintpe » Jan 23rd, '13, 18:31

ok NFS and security

the two do not co-exist in the ways that you are defining, at least uptil nfs4.

and its a bad way to go forward.

if a user mounts a remote share and he has the uid/gid to access files on that share then he can.

you can protect against people su to root using rootsquash, so root = anon over NFS.

the ip blocking will help, but if someone puts a rouge computer on the network with that IP
and forces the routers to accept its ethernet address, then he may be able to create and use that uid and
access those files.

ive not looked at nfsv4 to see what that can do but any nfs upto that does not support a fully secure nfs option.

only the authentication part is secure.

kerberos setup is relitivly straight forward, brian tung wrote a good book that makes sence of it.

but as far as i remember this is login via ssh/ftp/rsh etc and authentication, adding hosts etc.

dont remember it covering secure nfs.

securenfs was origionaly implemented using NIS and privatekeys .

anyhow hope some of that helps.

regards peter
Redhat 6 Certified Engineer (RHCE)
Sometimes my posts will sound short, or snappy, however its realy not my intention to offend, so accept my apologies in advance.
wintpe
 
Posts: 1204
Joined: May 22nd, '11, 17:08
Location: Rayleigh,, Essex , UK


Return to Networking

Who is online

Users browsing this forum: No registered users and 1 guest

cron