Explain why the RPC interface to early implementations of NFS is potentially insecure. The security loophole has been closed in NFS 3 by the use of encryption. How is the encryption key kept secret? Is the security of the key adequate?
What will be an ideal response?
The user id for the client process was passed in the RPCs to the server in unencrypted form. Any program could simulate the NFS client module and transmit RPC calls to an NFS server with the user id of any user, thus gaining unauthorized access to their files. DES encryption is used in NFS version 3. The encryption key is established at mount time. The mount protocol is therefore a potential target for a security attack. Any workstation could simulate the mount protocol, and once a target filesystem has been mounted, could impersonate any user using the encryption agreed at mount time..
You might also like to view...
To find the smallest and largest element of a Collection, use Collections methods _________ and __________.
a. least, greatest. b. smallest, largest. c. first, last. d. min, max.
In the accompanying figure, the text marked with a green arrow is the result of having a(n) ____ attribute in the code.
A. alt B. src C. name D. img
The web consists of millions of websites and ____________________ of webpages.
Fill in the blank(s) with the appropriate word(s).
Increasingly, computers and hard drives are ____________________; that is, encrypting all data automatically and invisibly to the user.
Fill in the blank(s) with the appropriate word(s).