14-NFS - CSE 265 System and Network Administration The...

Info iconThis preview shows pages 1–6. Sign up to view the full content.

View Full Document Right Arrow Icon
Spring 2006 CSE 265: System and Network Administration ©2006 Brian D. Davison CSE 265: CSE 265: System and Network Administration System and Network Administration The Network File System NFS Introduction Server-side NFS Client-side NFS NFS Statistics with nfsstat Dedicated NFS File Servers Automatic Mounting Automount AMD
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spring 2006 CSE 265: System and Network Administration ©2006 Brian D. Davison NFS NFS Network File System Allows systems to share filesystems among computers Designed to be transparent and stateless Consists of A mounting protocol Mount server File service daemons Diagnostic utilities
Background image of page 2
Spring 2006 CSE 265: System and Network Administration ©2006 Brian D. Davison Magic cookies Magic cookies The server doesn't track which clients have mounted filesystems (stateless) Instead, the server discloses a secret/magic cookie that identifies the directory to the server on future access Often the cookie is just the filesystem major and minor device IDs, plus directory inode Unmounting and remounting the actual filesystem on the server normally changes the cookie
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Spring 2006 CSE 265: System and Network Administration ©2006 Brian D. Davison NFS NFS Network File System Version 2: slow Originally released by Sun in 1985 Version 3: faster (common) Version 4: security, locking (new) Uses Sun's RPC (Remote Procedure Call) protocol (documented in RFC 1050, 1988) Supports UDP or TCP for transport File locking is worse under NFS v3 since servers are stateless
Background image of page 4
Spring 2006 CSE 265: System and Network Administration ©2006 Brian D. Davison Security and NFS Security and NFS Not originally designed for security! Access to NFS volumes is determined via /etc/exports lists hostnames or IP addresses that have access assumes clients will identify themselves correctly TCP wrappers can help protect service File-level access is managed according to UID, GID, and file permissions Just as in local file systems
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 6
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 08/06/2008 for the course CSE 265 taught by Professor Davison during the Spring '08 term at Lehigh University .

Page1 / 16

14-NFS - CSE 265 System and Network Administration The...

This preview shows document pages 1 - 6. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online