Exporting GuardPoints over NFS
Warning
- 
CTE-U cannot guard a sub-directory of an exported NFS share directory. The guarded path must be the same as the NFS exported path. 
- 
Use of process sets or signature sets is not supported 
Note
- For CTE-U v10.3.0 and subsequent versions, user sets are supported. See Creating User Sets for more information.
Prerequisites
CTE-U does not support process-based access checks with the export scenario. To protect the operation of the necessary files for the NFS client, you must either disable the authenticator check or add the NFS process as an authenticator.
- 
To disable the authenticator check, type: voradmin secfs config uid_search 0
- 
To add the NFS process as an authenticator, add the following in the CipherTrust Manager > Client Settings field: |authenticator|/usr/sbin/rpc.mountd |authenticator|/usr/sbin/rpc.nfsd |authenticator|/usr/sbin/exportfs
Setup and Configuration
To setup and configure your NFS server so that you can export GuardPoints:
- 
Make sure that CTE-U is started before the NFS server is started: vi /usr/lib/systemd/system/nfs-server.serviceResponse network-online.target local-fs.target secfs-fuse.service
- 
Create your GuardPoints on your NFS server. 
- 
Verify that the /etc/exportsfile contains the following:/guardpoint/path <nfs_server_IP>(rw,sync,fsid=3,no_root_squash)
- 
Verify that secfs_fusewas started before NFSD:ps -ef |grep secfs; ps -ef |grep nfsd nfsd pidNote The GuardPoint PID is valid as long as the NFS daemon is not restarted. 
- 
If secfs_fusewas not started before NFSD, or if you are unable to verify it, restart the NFS server:service nfs-server restart
- 
Mount the client: mount -t nfs -o lookupcache=none <ip address>:/mount/share /local/mountpointNote - 
Use the mount -o nocacheoption for an NFS (Network File System) client to disable client-side caching for file data. This ensures that all of the I/O requests are received on the CTE-U server so that CTE-U can provide valid access checks.
- 
When mounting as a non-root user with NFS mount (guarded in NFS server): - 
Specify only the GID for the non-root user in the user set configuration in the policy. 
- 
Alternatively, include the root user as part of the user set configuration in the policy, but limit root user permissions. The following allows the root user to mount NFS, but they cannot read the actual data. - 
Action = d_rd-att
- 
Effect = permit,audit
 
- 
 
- 
 
-