That's quite true and a valid point. However, how do you handle
something like, say, an export that contains home directories? We have
thousands of home directories that we deal with every day. It can't
possibly be expected of us to modify the exports on the filer for every
single new user we add. Not only would that make the exports file
cumbersome and long, it's simply a step backward in supportability.
The example I gave of using client-side options in /etc/fstab to secure
a mount was simply one example. In our environment of course we have
all of our exports set up with the appropriate netgroups and users given
the appropriate permissions. However, this problem extends even to the
point that *this* is a problem. Take this, for example:
[EMAIL PROTECTED] ~]$ ypcat -k auto.tool | grep site-
site-lib -intr eng:/vol/vol18/site-config/provision/site-lib
site-config -intr eng:/vol/vol18/&
[EMAIL PROTECTED] ~]$ grep vol18 /tool/eng-vol0/etc/exports
/vol/vol18 -sec=sys,[EMAIL PROTECTED],[EMAIL PROTECTED],anon=4058
/vol/vol18/site-config/provision/site-lib
-sec=sys,[EMAIL PROTECTED],[EMAIL PROTECTED],anon=4058
So we have /tool/site-config exported read-write to the world (@pcd is
all our hosts), but root only has permissions on the @tx_admin_nodes.
There is a subdirectory (site-lib) that we have explicitly exported (and
properly locked down) that is read-write *as root* to the world. The
reasons that this directory structure were necessary is beyond the scope
of this e-mail.
So with RHEL3 and RHEL4, this worked great. You could have both
/tool/site-config and /tool/site-lib mounted on a system and the correct
permissions would be set.
But with RHEL5, if you mount /tool/site-lib *first*, then you get root
read/write permissions to /tool/site-config! And vice-versa, if you
mount /tool/site-config first, you *lose* root permissions on
/tool/site-lib!
Certainly this can't be seen by the NFS maintainers as "correct"?!
Surely *somebody* sees this and goes "crap! That's not what we intended!"
Or are Ian and I the only ones dismayed by this change?
Paul Krizak 5900 E. Ben White Blvd. MS 625
Advanced Micro Devices Austin, TX 78741
Linux/Unix Systems Engineering Phone: (512) 602-8775
Silicon Design Division Cell: (512) 791-0686
Brian Long wrote:
On Fri, 2007-05-04 at 16:51 +0800, Ian Kent wrote:
<snip> I could see how a sysadmin could set up
something like this expecting it to be secure.
A sysadmin should know that client-side security is not full
security. :) Exports on the NFS server should be written such that
subdirectories are exported with the proper permissions to the proper
groups of hosts (or even users with NFSv4). This is one argument CIFS
had over NFS until NFSv4: user-level authentication.
/Brian/
_______________________________________________
rhelv5-list mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhelv5-list