-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Ed Wilts wrote:

>> how stupid/dangerous would it be to run a server from home running nfs so
>i
>> could access it from work?
>
>Bluntly put, very stupid and dangerous.  NFS is affectionately known to
>stand for No F*cking Security.  Basically the protocol works by trusting the
>client.  Since you can not trust the client in a wide-area scenario, you're
>opening yourself up for disaster.  You could get away with exposing a small
>subset of your files to read-only NFS access, but anything other than that
>can be written is wide-open to the world.

No quarrel with the above, but I'd suggest that it's more justifiable
if you are restricting the export to a net block which you control, or
to a single address.  If you're only connecting from a single static
IP address, and you have faith that you alone control that address,
you might be ok with this.  But be aware that we're talking about
cleartext traffic here, so the data itself is exposed, which may or
may not matter to you.

The preferred quick-and-dirty here is definitely an ssh tunnel, and 
even then only from a trusted client.

- -d

- -- 
David Talkington

PGP key: http://www.prairienet.org/~dtalk/0xCA4C11AD.pgp
- --
http://setiathome.ssl.berkeley.edu/pale_blue_dot.html

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Made with pgp4pine 1.75-6

iQA/AwUBPGMx179BpdPKTBGtEQKAPgCfUd+zyVmoPfbpfzzizrtzygHSnPwAn3us
bOmU4rrCtYomz7trHzSs4L6S
=sKpt
-----END PGP SIGNATURE-----




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to