From: [EMAIL PROTECTED] 
> > i file nfs traffic into the "stuff not supposed to be going through
> > the firewall" category.  a firewall implies there are bad people on
> > one side of it, and you don't want bad people to access nfs, ever.
> > i'd use a vpn of some sort to tunnel through the firewall.
> 
> I agree, however, my NFS traffic is not passing through a 
> firewall. This 
> is an internal host on a "trusted" network serving things 
> like http. I 
> usually lock down all of my boxes whether they are facing the 
> Internet 
> or not. Anyway, I just recently decided to export an NFS 
> share on this 
> box and ran into my originally posted problem.
> It just kind of sucks that now I have to compromise security or 
> functionality or create workaround. Not that this box really needs to 
> run pf, I just feel better about doing so.

Such is life. Put the blame where it is due; RPC blows, and NFS blows too.
Neither of them lend well in any way towards "security." The only
"protections" that have come about for them are kludges anyway, like the -p
switch. The dynamic port mappings thing was a "let's put in some security"
before such crap was known to be a trivial joke.

authpf seems a reasonable compromise if you can manage it. I think it's
somewhat unrealistic to expect much better out of the whole situation.

DS

Reply via email to