> On Wed, 2018-02-21 at 13:40 -0800, Frank Filz wrote: > > > On 2/21/18 1:59 PM, GerritHub wrote: > > > > Jeff Layton has uploaded this change for *review*. > > > > > > > > View Change <https://review.gerrithub.io/400871> > > > > > > > > MainNFSD: invert _NO_PORTMAPPER option > > > > > > > > The fact that this is a "negative" option is confusing. Change it > > > > to a "PORTMAPPER" option, and have it default to ON. > > > > > > > > > > While I vaguely agree with the former in principle, in this day and > > > age we > > > > really > > > should stop using the name PORTMAPPER. Replaced by rpcbind a long > > > time > > > > ago, > > > and shouldn't be shipping with modern systems. > > > > > > In ntirpc, PORTMAP is as expected the old version 2 UDP-only call. > > > We > > > > should > > > kill it. > > > > > > We really shouldn't encourage folks to use a UDP system that has > > > long had known DDoS attacks. > > > > > > And we really should be migrating from NFS 2 UDP to NFS 3 TCP, as a > > > > minimum > > > supported version.... > > > > > > Also, we have talked about adding rpcbind itself to Ganesha or ntirpc. > > > > Well, the "NO_PORTMAPPER" option really controls rpcbind now... > > > > Though actually, I'm not sure Ganesha actually uses any of the > > extension of rpcbind, it would probably talk to portmap just fine... > > > > And we no longer support NFS v2 (we have a couple NFS v2 stubs because > > at one time in history, the Linux client issued NFS v2 requests even > > though it was an NFS v3 mount - really just the UMOUNT was the NFS v2 > > version I think > > - it's all there in the code). That code might indeed be safe to > > remove, on the other hand, folks with appliance products tend to not > > like to force particular client versions too much as long as the pain > > point isn't too bad, and this fragment of V2 support isn't too bad. > > > > We could take this opportunity to change the option to RPCBIND... > > > > Fair enough. > > I actually disagree with the "no udp" statement above too. UDP is great for > single-shot request protocols like rpcbind, and the NFS client will use it. > DDoS is > a possibility, but who exposes their rpcbind port to the Internet? > > In any case, the real fix to this issue is to move to protocols that don't > require > rpcbind at all. That means NFSv4.0 at a minimum (though obviously v4.1+ would > be preferred).
The Linux kernel client can use NFS v3 without rpcbind, though not sure you can specify the NLM port, I know you can specify the NFS and MOUNT ports. On the other hand, rpcbind is a nice way to check general reachability of the server and what's up (and you can ping services via rpcinfo...). Frank ------------------------------------------------------------------------------ Check out the vibrant tech community on one of the world's most engaging tech sites, Slashdot.org! http://sdm.link/slashdot _______________________________________________ Nfs-ganesha-devel mailing list Nfs-ganesha-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/nfs-ganesha-devel