19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Communications Remarks<br />

____________________________________________________________________ .........................................<br />

S 5.17 Use of the NFS security mechanisms<br />

Initiation responsibility: <strong>IT</strong> Security Management, Administrators<br />

Implementation responsibility: Administrators<br />

NFS (Network File System) allows common use of files on a server from all<br />

computers (clients) which are integrated in the same network and have<br />

obtained the pertinent rights on the server. Every server can also be operated<br />

as a client, and vice versa. It has to be ensured that every computer works only<br />

with the function assigned to it. Thus, for instance, it is not necessary to start<br />

the mount daemon mountd or the NFS daemon nfsd on an NFS client.<br />

- On an NFS server every file system or directory which can be mounted by<br />

other computers must be entered in a file (e.g. /etc/exports or<br />

/etc/dfs/dfstab). <strong>The</strong> following requirements apply in this case:<br />

- Only file systems absolutely required should be exported.<br />

- With the key words root= and access=, it is possible to precisely<br />

define the computers to which data systems are to be released for<br />

export. If no specific computers have been designated, the respective<br />

data system is approved for use by all computers, and this must be<br />

precluded at all events!<br />

- For read-only file systems, and these include all executable files, the<br />

ro option (read only) should be used.<br />

- Normally, the user ID of the system administrator (UID 0) will, for<br />

NFS queries, be reset to the number of the user nobody (UID -2 or<br />

65534) so that files with the UID 0 cannot be accessed through NFS.<br />

This does not apply to files belonging to other privileged users, such<br />

as bin or daemon, a fact that will also have to be borne in mind in the<br />

context of the division of administrator roles (S 2.32 Establishment<br />

of a restricted user environment), i.e. file systems comprising files of<br />

these users must not be exported. Since any computer within the<br />

network can assume any ID and, for instance, any PC user has root<br />

privileges under DOS, mapping of root to nobody should not be<br />

disabled, and it should be ensured that the entry nobody:*:-2:-<br />

2:anonymous users:: exists, and is effective, in the /etc/passwd. In<br />

this context, it must also be borne in mind that any user having root<br />

privileges on a networked computer (e.g. as a PC user) can, through<br />

NFS, also assume any group ID so that consequently no exported<br />

directory and no exported file should have group write-access rights<br />

and, moreover, only have read and execute rights to the extent<br />

absolutely necessary. In addition, attention should be paid to the fact<br />

that not only individual files, but all higher-level directories must be<br />

protected!<br />

- <strong>The</strong> anon=-1 option should be used to prevent anonymous queries.<br />

anon=0 (root) should never be used as this makes it possible for any<br />

user to access files with root privileges.<br />

- In files such as /etc/fstab or /etc/vfstab, those file systems are listed which<br />

can be mounted by a command such as mount -a or mountall. This might<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!