Date: Sun, 14 Jan 2001 00:17:20 +0100 From: "David Andreas Alderud" <aaldv97@student.vxu.se> To: "_Security" <security@FreeBSD.ORG> Subject: Re: Encrypted networked filesystem needed Message-ID: <003e01c07db6$fac4b850$6400a8c0@xgod> References: <Pine.NEB.3.96L.1010112213123.14123C-100000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
It might be a good idea to take a look at NIS+ if you want to use NFS, there still some problems but considering how simple it is to use NIS+ it's really good, NIS+ removes most if the problems with DNS. The reasons for using NIS+ is mainly because it's designed to work with NFS, both coming from Sun Microsystems. /Kind regards, David A. Alderud :From: "Robert Watson" <rwatson@FreeBSD.ORG> :Subject: Re: Encrypted networked filesystem needed : : It's important to note that even if you use IPsec, you still need to be : careful with NFS, for a number of reasons. The easiest attack is a DNS : spoofing attack: clients often use DNS to resolve the IP address of the : server they connect to, and if they rely on unprotected DNS traffic, then : they may be vulnerable to spoofing, causing them to access a different : server than the one they intended to mount. And, needless to say, IPsec : policy must be set appropriately for relevant IP addresses at both ends, : which also need to be specified in a spoof-free manner. The best rule is : to hard-code IP addresses wherever possible, or rely on /etc/hosts and : appropriate resolution ordering, or to use DNSsec (if available). There : are other attacks against NFS also. : : Robert N M Watson FreeBSD Core Team, TrustedBSD Project : robert@fledge.watson.org NAI Labs, Safeport Network Services To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?003e01c07db6$fac4b850$6400a8c0>