home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gatech!emory!sol.ctr.columbia.edu!zaphod.mps.ohio-state.edu!darwin.sura.net!sgiblab!cs.uoregon.edu!news.uoregon.edu!darkwing.uoregon.edu!jneher
- From: jneher@darkwing.uoregon.edu (Jonathan Neher)
- Newsgroups: comp.sys.sun.admin
- Subject: NFS Security with Multinet
- Date: 19 Nov 1992 18:37:15 GMT
- Organization: University of Oregon Network Services
- Lines: 40
- Distribution: world
- Message-ID: <1egmsrINNi2j@pith.uoregon.edu>
- NNTP-Posting-Host: darkwing.uoregon.edu
-
- Hi,
-
- I'm experiencing an NFS security hole that I wonder if anyone
- would like to comment about.
-
- We have a Sun 600MP running 4.1.3 with all of the patches Sun
- has available on ftp.uu.net.
-
- We are testing an evaluation copy of MultiNet's VMS TCP/IP/NFS etc.
- and when we mount a partition from the Sun onto the VAXstation. Any
- users with system level file access on the VAXstation could
- move to and look at files in directories not owned by them
- with permissions like drwx------. They couldn't create or overwrite
- files in the directory, only cd there and look at them.
-
- I tried exporting the partition in question with and without
- the anon=-1 arguement and that didn't make any difference.
- I at no time used the -root export arguement. All I did was add
- the VAXstation to the -access list for the exported directory.
-
- At the Sun's system console, messages would appear something like:
-
- nfs_server: weak authentication, source IP address=ipaddress_of_the_vaxstation
-
- Is there some way for me to close this security hole? This also
- happens with partitions exported from a NeXT machine to the VAXstation.
-
- Any ideas?
-
- Thanks,
-
- Jon Neher
-
-
-
- --
- Jonathan Neher
- Systems Programmer Office: 213 Computing Center
- Computing Center Internet: jneher@darkwing.uoregon.edu
- University of Oregon Voice: (503) 346-1731
-