Network File System ( Nfs ) Essay
NFS has received some very disappointing reviews. While in its development it was generally accepted and implemented wherever such a protocol was needed, a 2010 bulletin board (OpenBSD) post from Theo de Raadt wrote: "NFSv4 is not on our roadmap. It is a ridiculous bloated protocol which they keep adding crap to. In about a decade the people who actually start auditing it are going to see all the mistakes that it hides." (Raadt, 2010)
As with any protocol that is developed, once it is accepted and implemented it must be maintained properly (and in a useful manner) or it will be replaced without ceremony.
In terms of security: “With NFS, there are two steps required for a client to gain access to a file contained in a remote directory on the server. The first step is mount access. Mount access is achieved by the client machine attempting to attach to the server. The security for this is provided by the /etc/exports file. This file lists the names or IP addresses for machines that are allowed to access a share…