====== Home NFS Setup HOWTO ====== This is a quick guide to setting up NFS in Slackware for use in a home LAN. The example used is for connection of a laptop computer with a desktop computer that also has an NTFS partition mounted on /music. It assumes that basic network connectivity has been established. This guide is largely cut and pasted from other more definitive documents. From http://nfs.sourceforge.net/nfs-howto/ 2.1. What is NFS? The Network File System (NFS) was developed to allow machines to mount a disk partition on a remote machine as if it were a local disk. It allows for fast, seamless sharing of files across a network. It also gives the potential for unwanted people to access your hard drive over the network (and thereby possibly read your email and delete all your files as well as break into your system) if you set it up incorrectly. Setting up a secure NFS does require some additional work, but as good security habits start at home, these steps will also be presented. For the purposes of this example: * the desktop computer will be called DESKTOP and has an IP address 10.1.1.2 * the laptop computer will be called LAPTOP and has an IP address 10.1.1.3 using a wired connection * or the laptop computer will be called LAPTOP-W and has an IP address 10.1.1.4 using a wireless connection Both computers will be setup to act as NFS servers as well as clients. ===== Access settings ===== **/etc/hosts** On the desktop computer /etc/hosts should have lines like: 10.1.1.3 LAPTOP. LAPTOP 10.1.1.4 LAPTOP-W. LAPTOP-W On the laptop computer /etc/hosts should have a line like: 10.1.1.2 DESKTOP. DESKTOP **/etc/hosts.deny** On both machines add: portmap:ALL lockd:ALL mountd:ALL rquotad:ALL statd:ALL **/etc/hosts.allow** On the desktop computer add: # For NFS mount from LAN portmap: 10.1.1.3 , 10.1.1.4 lockd: 10.1.1.3 , 10.1.1.4 rquotd: 10.1.1.3 , 10.1.1.4 mountd: 10.1.1.3 , 10.1.1.4 statd: 10.1.1.3 , 10.1.1.4 On the laptop computer add: # For NFS mount from LAN portmap: 10.1.1.2 lockd: 10.1.1.2 rquotd: 10.1.1.2 mountd: 10.1.1.2 statd: 10.1.1.2 The syntax in the above examples can be altered, e.g. 10.1.1. could be used to allow access from any machine on the 10.1.1.0/24 network. **/etc/exports** On the desktop computer add: # Allow export of root file system to LAPTOP with read/write and root access / LAPTOP(rw,no_root_squash,no_subtree_check) \ LAPTOP-W(rw,no_root_squash,no_subtree_check) /music LAPTOP(rw,no_root_squash,no_subtree_check,nohide) \ LAPTOP-W(rw,no_root_squash,no_subtree_check,nohide) On the laptop computer add: # Allow export of root file system to DESKTOP with read/write and root access / DESKTOP(rw,no_root_squash,no_subtree_check) Comments * The //no_root_squash// option is very permissive. The //root_squash// option is much more secure. * Allowing access to the entire root file system is very permissive. Restriction to a sub-directory is much more secure. * The nohide option is required to show the contents of other mounted partitions. ===== Daemon startup ===== **/etc/rc.d/rc.nfsd** Check that this file is executable on both computers **/etc/rc.d/rc.rpc** Check that this file is executable on both computers. (Not strictly necessary as /etc/rc.d/rc.nfsd will run this, but will be important if you want the computer to work as an NFS client only). ===== Binding ports ===== **a) Slackware versions up to 14.2** To use NFS through the firewall follow this guide that is quoted verbatim. Thanks rworkman! From http://rlworkman.net/howtos/NFS_Firewall_HOWTO This document is intended to give you detailed steps for making NFS bind to user-specified ports instead of random ports assigned by the portmapper. This makes it *much* easier to run a firewall on the NFS server, as you don't have to kludge something to find the NFS ports at each boot to open them with iptables. NOTE: This was written for Slackware Linux, but the general ideas should apply on pretty much any distribution. First, you'll want (it's not necessary, but handy to have for later) to make sure all of this is in /etc/services. I made sure "NFS" is in all of what I added or modified so that I can easily remove them (or just find them) if I need them later. Note that many of these are *local* additions - they are not official IANA assignments. sunrpc 111/tcp # SUN Remote Procedure Call sunrpc 111/udp # SUN Remote Procedure Call nfsd 2049/tcp # NFS server daemon nfsd 2049/udp # NFS server daemon rpc.nfs-cb 32764/tcp # RPC nfs callback rpc.nfs-cb 32764/udp # RPC nfs callback status 32765/udp # NFS status (listen) status 32765/tcp # NFS status (listen) status 32766/udp # NFS status (send) status 32766/tcp # NFS status (send) mountd 32767/udp # NFS mountd mountd 32767/tcp # NFS mountd lockd 32768/udp # NFS lock daemon/manager lockd 32768/tcp # NFS lock daemon/manager rquotad 32769/udp # NFS rquotad rquotad 32769/tcp # NFS rquotad ************************************************************************ Next, you'll need to modify your /etc/rc.d/rc.nfsd script accordingly: For other linux distributions, find the script that starts these daemons and add the needed flags. # **** Make the quota daemon listen on port 32769 if [ -x /usr/sbin/rpc.rquotad ]; then echo " /usr/sbin/rpc.rquotad -p 32769" /usr/sbin/rpc.rquotad -p 32769 fi # **** Make the mount daemon listen on port 32767 if [ -x /usr/sbin/rpc.mountd ]; then echo " /usr/sbin/rpc.mountd -p 32767" /usr/sbin/rpc.mountd -p 32767 fi Now modify the /etc/rc.d/rc.rpc script (again, for other linux distros, find the script that starts this daemon and add the needed flags). On older versions (less than 11.0) of Slackware, rpc.statd is started in rc.nfsd, so look there instead. # **** Have the portmap daemon chroot to /var/empty for increased security # **** Make the status daemon listen on port 32765 and talk on port 32766 if [ -x /sbin/rpc.portmap -a -x /sbin/rpc.statd ]; then if ! ps axc | grep -q rpc.portmap ; then echo "Starting RPC portmapper: /sbin/rpc.portmap -t /var/empty" /sbin/rpc.portmap -t /var/empty fi if ! ps axc | grep -q rpc.statd ; then echo "Starting RPC NSM (Network Status Monitor): /sbin/rpc.statd -p 32765 -o 32766" /sbin/rpc.statd -p 32765 -o 32766 fi # **** Note that you'll have to open port 32766 on the NFS clients Now make the lock daemon listen on port 32768 only and set the nfs callback port to 32764. Up to Slackware 11.0, this requires a kernel boot parameter (an append= line in lilo.conf) - a kernel stanza will look something like this: image = /boot/vmlinuz-ide-2.4.37.11 append = "lockd.udpport=32768 lockd.tcpport=32768" root = /dev/hda2 label = 2.4.37.11 read-only After 11.0, but before Slackware 13.1, this requires setting module load options in a file in the /etc/modprobe.d/ directory - I create an aptly named file of /etc/modprobe.d/nfs.conf file and add the following lines: options lockd nlm_udpport=32768 nlm_tcpport=32768 options nfs callback_tcpport=32764 # This is for NFSv4 In Slackware 13.1 and later, you will instead need to place the following in /etc/sysctl.conf: fs.nfs.nlm_udpport=32768 fs.nfs.nlm_tcpport=32768 fs.nfs.nfs_callback_tcpport=32764 Finally, you'll need to reboot the machine since the lockd module probably will refuse to unload. Once it's rebooted, you can test to make sure all of the changes "took" with "rpcinfo -p" or "pmap_dump" (rpcinfo is no longer present in Slackware 14.0 or later) -- as an example, here's a snippet of what I see here: stora # rpcinfo -p program vers proto port 100000 2 tcp 111 portmapper 100000 2 udp 111 portmapper 100024 1 udp 32766 status 100024 1 tcp 32766 status 100227 3 tcp 2049 100227 3 udp 2049 100021 3 udp 32768 nlockmgr 100021 3 tcp 32768 nlockmgr 100005 3 udp 32767 mountd 100005 3 tcp 32767 mountd Copyright 2006-2011 Robby Workman, Tuscaloosa, Alabama, USA #include /* Standard MIT License */ You may mirror and/or otherwise use this file as you wish so long as you retain attribution to the author. If you have any questions, comments, or suggestions for improvement, you may contact me at rworkman AT slackware.com Note: Updated 20111126 for better consistency with the Debian NFS HOWTO (since the actual port assignments aren't important, we may as well recommend the same thing in both places); thanks to David Allen for the pointers and recommendation... Note: Updated 20120820 to note pmap_dump usage instead of rpcinfo in Slackware 14+; thanks to David Allen for the heads-up on that. **b) Slackware version after 14.2** To use NFS through the firewall is now easier, as options for NFS can be set in /etc/default/nfs and /etc/default/rpc. It is simply necessary to uncomment the appropriate lines in /etc/default/rpc. **/etc/default/rpc** # See also /etc/default/nfs # Optional arguments passed to rpcbind. See rpcbind(8) #RPCBIND_OPTS="" # # Optional arguments passed to rpc.statd. See rpc.statd(8) #RPC_STATD_OPTS="" # Optional hostname to start rpc.statd with. #RPC_STATD_HOSTNAME="darkstar" # Port rpc.statd should listen on. RPC_STATD_PORT=32766 # Outgoing port rpc.statd should use. RPC_STATD_OUTGOING_PORT=32765 # # Optional options passed to rquotad. See rquotad(8) #RPC_RQUOTAD_OPTS="" # Optional port rquotad should listen on: RPC_RQUOTAD_PORT=32769 # # TCP port rpc.lockd should listen on: LOCKD_TCP_PORT=32768 # UDP port rpc.lockd should listen on: LOCKD_UDP_PORT=32768 # # Optional arguments passed to rpc.mountd. See rpc.mountd(8) #RPC_MOUNTD_OPTS="" # Port rpc.mountd should listen on: RPC_MOUNTD_PORT=32767 # ===== Firewall settings ===== **/etc/rc.d/rc.firewall** Here are some example lines to allow NFS: ## NFS uses TCP and UDP on ports 111, 2049, 32764-32769 # Accept TCP and UDP on port 111 from local LAN for portmap $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 111 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 111 -j ACCEPT # Accept TCP and UDP on port 2049 from local LAN for nfsd $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 2049 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 2049 -j ACCEPT # Accept TCP and UDP on port 32765 from local LAN for statd listen # (set in /etc/rc.d/rc.rpc for Slackware <= 14.2 or /etc/default/rpc for Slackware >= 14.2-current) $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 32765 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 32765 -j ACCEPT # Accept TCP and UDP on port 32766 from local LAN for statd send # (set in /etc/rc.d/rc.rpc for Slackware <= 14.2 or /etc/default/rpc for Slackware >= 14.2-current) $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 32766 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 32766 -j ACCEPT # Accept TCP and UDP on port 32767 from local LAN for mountd # (set in /etc/rc.d/rc.nfsd for Slackware <= 14.2 or /etc/default/rpc for Slackware >= 14.2-current) $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 32767 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 32767 -j ACCEPT # Accept TCP and UDP on port 32768 from local LAN for lockd # (set in /etc/sysctl.conf for Slackware <= 14.2 or /etc/default/rpc for Slackware >= 14.2-current) $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 32768 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 32768 -j ACCEPT # Accept TCP and UDP on port 32769 from local LAN for rquotad # (set in /etc/rc.d/rc.nfsd for Slackware <= 14.2 or /etc/default/rpc for Slackware >= 14.2-current) $IPTABLES -A INPUT -i $EXTIF -p tcp -s $LOCAL_LAN --dport 32769 -j ACCEPT $IPTABLES -A INPUT -i $EXTIF -p udp -s $LOCAL_LAN --dport 32769 -j ACCEPT The work is done! Everything should now be in place. After rebooting both machines it should now be possible to: * mount the root file system on the desktop computer on the /mnt/tmp directory on the laptop using mount DESKTOP:/ /mnt/tmp * mount the root file system on the laptop computer on the /mnt/tmp directory on the desktop using mount LAPTOP:/ /mnt/tmp ====== Sources ====== * http://nfs.sourceforge.net/nfs-howto/ * http://rlworkman.net/howtos/NFS_Firewall_HOWTO {{tag>howtos software nfs slackware_13.37 slackware_14.0 author_allend}}