On Sat, Feb 28, 2009 at 1:51 PM, Ingo Schwarze <[email protected]> wrote:
> Hi Felipe, > > Felipe Alfaro Solana wrote on Sat, Feb 28, 2009 at 10:53:50AM +0100: > > On Thu, Feb 26, 2009 at 11:13 PM, Ingo Schwarze <[email protected]> > wrote: > >> Jean-Francois wrote on Wed, Feb 25, 2009 at 10:08:22PM +0100: > > >>> I actually built the following system : > >>> - OpenBSD running on a standard AMD platform > >>> - This box is actually used as firewall > >>> - This box is also used as webserver > >>> - This box is finally used as local shared drives via NFS file > >>> but only open to subnetwork through PF > > >> NFS is not designed with security in mind. It transmits data > >> unencrypted. It has no real authentication and no real access > >> control. If is designed for strictly private networks with > >> no external access that no potential attackers have access to. > > > Just to clarify, > > On an OpenBSD list, i am talking about NFS on OpenBSD (-current > and -stable), and that's NFSv3. ;-) > Of course, you are right that i could have mentioned that. > > > NFSv4 does not necessarily transmit data in clear text. > > NFSv4 allows one to use encryption and/or data authentication. > > That doesn't help the original poster because NFSv4 is not > available on OpenBSD. See > > http://marc.info/?l=openbsd-misc&m=123469849717017 > Peter Hessler wrote on Feb 15, 2009: > "openbsd uses nfsv3 over ipv4. > nfsv4 is still being worked on, but is not ready." Well, if NFSv4 is not an option for OpenBSD, then it's clear that NFS on OpenBSD is a very poor choice due to lack of proper authentication and encryption :) > > NFSv3 and older versions do not use encryption at all, > > but you can use IPSec to protect it at the network layer. > > I do not know enough about IPSec to judge whether and under which > conditions it's viable, effective and efficient to secure NFS usage > in an internal network that attackers have access to by using IPSec > between the NFS server and each NFS client. Maybe this could be > an option. Of course if the attacker can gain remote access to the machine, IPSec is not very useful since the attacker can probably retrieve the encryption keys from the kernel :) IPSec is only useful to prevent attacks (replay, sniff, etc.) from the network. Thanks for pointing this out. But even if that's sound, which i neither claim nor deny, it's still > a bad idea to run purely internal services on a firewall, no matter > whether they use encrtption or not. And I totally agree with you, Mixing firewall services with services like Web or file/print services is a recipe for disaster.

