PERFORCE change 36910 for review
Robert Watson
rwatson at FreeBSD.org
Mon Aug 25 21:02:24 GMT 2003
http://perforce.freebsd.org/chv.cgi?CH=36910
Change 36910 by rwatson at rwatson_paprika on 2003/08/25 14:02:04
Finish up more of the NFS section.
Affected files ...
.. //depot/projects/trustedbsd/doc/en_US.ISO8859-1/books/arch-handbook/secarch/chapter.sgml#2 edit
Differences ...
==== //depot/projects/trustedbsd/doc/en_US.ISO8859-1/books/arch-handbook/secarch/chapter.sgml#2 (text+ko) ====
@@ -1727,13 +1727,16 @@
permission to mount a file system is explicitly configured by
the server administrator by means of the &man.exports.5;
configuration file.
- These protections are implemented XXX
Each file system is exported only to explicitly configured hosts;
for each configuration line, arbitrary mappings of local and
remote users are provided, as well as mount flags indicating,
broadly, what types of mounts are permitted (read-only or
otherwise).
- Once amount has taken place, each file system RPC is accompanied
+ Enforcement of these protections is split between the user mountd
+ process, which reads the <literal>/etc/exports</literal> file
+ and services mount requests, and the kernel NFS implementation,
+ which is informed of the export rules by the mount daemon.
+ Once a mount has taken place, each file system RPC is accompanied
by a credential structure approximately equivilent to the local
credential structure, consisting of effective uid, effective gid,
and a set of additional groups.
@@ -1743,7 +1746,10 @@
necessary uid and gid mapping first.
In the default configuration, network credentials with a uid of 0
are mapped to the "nobody user" to limit the level of privilege
- given to remote hosts.</para>
+ given to remote hosts.
+ In NFSv2, file permissions and protections are largely
+ implemented by the client system; in NFSv3, the server is
+ queried by the client before permitting most forms of access.</para>
<para>The NFSv2 and NFSv3 protocols supported by FreeBSD do not
provide for cryptographic protection of in-flight RPCs on the
@@ -1767,10 +1773,6 @@
name any object in the file system regardless of directory-based
protections, so clients must be trusted to locally enforce these
protections for this and other reasons.</para>
-<!--
-probably some mention of file handles and mountpoints
--->
-
</sect2>
<sect2 id="secarch-gbde">
To Unsubscribe: send mail to majordomo at trustedbsd.org
with "unsubscribe trustedbsd-cvs" in the body of the message
More information about the trustedbsd-cvs
mailing list