Date: Tue, 08 Apr 1997 16:34:15 -0700 From: John Polstra <jdp@polstra.com> To: bemfica@militzer.me.tuns.ca Cc: current@freebsd.org Subject: Re: nfs problem Message-ID: <199704082334.QAA09341@austin.polstra.com> In-Reply-To: <Pine.BSI.3.94.970408153912.3861A-100000@militzer.me.tuns.ca> References: <Pine.BSI.3.94.970408153912.3861A-100000@militzer.me.tuns.ca>
next in thread | previous in thread | raw e-mail | index | archive | help
In article <Pine.BSI.3.94.970408153912.3861A-100000@militzer.me.tuns.ca>, Antonio Bemfica <bemfica@militzer.me.tuns.ca> wrote: > On Tue, 8 Apr 1997, Doug Rabson wrote: > > > FreeBSD-current now uses secure ports by default. > > And what would be the proper way to reconcile this new behaviour with the > requests by clients that want access through insecure ports? I'm having > problems with amd, and would not like to just "make it work" now when > there is a recommended way of doing it (especially if it will get "broken" > again the next time I recompile the system). You can either configure the clients to use reserved ports, or you can configure the server so that it doesn't require them. To make a client use reserved ports, just add the "resvport" option to its mount command lines, or to your amd map file: /defaults type:=host;fs:=${autodir}/${rhost};rhost:=${key} * opts:=rw,grpid,resvport This option has already been added to /usr/src/etc/amd.map, by the way. Somebody else on this list recently described how to change the server configuration. Sorry, I don't remember how. -- John Polstra jdp@polstra.com John D. Polstra & Co., Inc. Seattle, Washington USA "Self-knowledge is always bad news." -- John Barth
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199704082334.QAA09341>