xref: /freebsd/usr.sbin/mountd/exports.5 (revision 77a0943ded95b9e6438f7db70c4a28e4d93946d4)
1.\" Copyright (c) 1989, 1991, 1993
2.\"	The Regents of the University of California.  All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\"    notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\"    notice, this list of conditions and the following disclaimer in the
11.\"    documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\"    must display the following acknowledgement:
14.\"	This product includes software developed by the University of
15.\"	California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\"    may be used to endorse or promote products derived from this software
18.\"    without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\"     @(#)exports.5	8.3 (Berkeley) 3/29/95
33.\" $FreeBSD$
34.\"
35.Dd March 29, 1995
36.Dt EXPORTS 5
37.Os
38.Sh NAME
39.Nm exports
40.Nd define remote mount points for
41.Tn NFS
42mount requests
43.Sh SYNOPSIS
44.Nm
45.Sh DESCRIPTION
46The
47.Nm
48file specifies remote mount points for the
49.Tn NFS
50mount protocol per the
51.Tn NFS
52server specification; see
53.%T "Network File System Protocol Specification \\*(tNRFC\\*(sP 1094, Appendix A"
54and
55.%T "NFS: Network File System Version 3 Specification, Appendix I" .
56.Pp
57Each line in the file
58(other than comment lines that begin with a #)
59specifies the mount point(s) and export flags within one local server
60filesystem for one or more hosts.
61A host may be specified only once for each local filesystem on the
62server and there may be only one default entry for each server
63filesystem that applies to all other hosts.
64The latter exports the filesystem to the ``world'' and should
65be used only when the filesystem contains public information.
66.Pp
67In a mount entry,
68the first field(s) specify the directory path(s) within a server filesystem
69that can be mounted on by the corresponding client(s).
70There are two forms of this specification.
71The first is to list all mount points as absolute
72directory paths separated by whitespace.
73The second is to specify the pathname of the root of the filesystem
74followed by the
75.Fl alldirs
76flag;
77this form allows the host(s) to mount at any point within the filesystem,
78including regular files if the
79.Fl r
80option is used on
81.Xr mountd 8 .
82The pathnames must not have any symbolic links in them and should not have
83any "." or ".." components.
84Mount points for a filesystem may appear on multiple lines each with
85different sets of hosts and export options.
86.Pp
87The second component of a line specifies how the filesystem is to be
88exported to the host set.
89The option flags specify whether the filesystem
90is exported read-only or read-write and how the client uid is mapped to
91user credentials on the server.
92.Pp
93Export options are specified as follows:
94.Pp
95.Sm off
96.Fl maproot No = Sy user
97.Sm on
98The credential of the specified user is used for remote access by root.
99The credential includes all the groups to which the user is a member
100on the local machine (see
101.Xr id 1 ).
102The user may be specified by name or number.
103.Pp
104.Sm off
105.Fl maproot No = Sy user:group1:group2:...
106.Sm on
107The colon separated list is used to specify the precise credential
108to be used for remote access by root.
109The elements of the list may be either names or numbers.
110Note that user: should be used to distinguish a credential containing
111no groups from a complete credential for that user.
112.Pp
113.Sm off
114.Fl mapall No = Sy user
115.Sm on
116or
117.Sm off
118.Fl mapall No = Sy user:group1:group2:...
119.Sm on
120specifies a mapping for all client uids (including root)
121using the same semantics as
122.Fl maproot .
123.Pp
124The option
125.Fl r
126is a synonym for
127.Fl maproot
128in an effort to be backward compatible with older export file formats.
129.Pp
130In the absence of
131.Fl maproot
132and
133.Fl mapall
134options, remote accesses by root will result in using a credential of -2:-2.
135All other users will be mapped to their remote credential.
136If a
137.Fl maproot
138option is given,
139remote access by root will be mapped to that credential instead of -2:-2.
140If a
141.Fl mapall
142option is given,
143all users (including root) will be mapped to that credential in
144place of their own.
145.Pp
146The
147.Fl kerb
148option specifies that the Kerberos authentication server should be
149used to authenticate and map client credentials.
150This option requires that the kernel be built with the NFSKERB option.
151The use of this option will prevent the kernel from compiling
152unless calls to the appropriate Kerberos encryption routines
153are provided in the NFS source.
154.Pp
155The
156.Fl ro
157option specifies that the filesystem should be exported read-only
158(default read/write).
159The option
160.Fl o
161is a synonym for
162.Fl ro
163in an effort to be backward compatible with older export file formats.
164.Pp
165.Tn WebNFS
166exports strictly according to the spec (RFC 2054 and RFC 2055) can
167be done with the
168.Fl public
169flag.
170However, this flag in itself allows r/w access to all files in
171the filesystem, not requiring reserved ports and not remapping uids.
172It
173is only provided to conform to the spec, and should normally not be used.
174For a
175.Tn WebNFS
176export,
177use the
178.Fl webnfs
179flag, which implies
180.Fl public ,
181.Sm off
182.Fl mapall No = Sy nobody
183.Sm on
184and
185.Fl ro .
186.Pp
187A
188.Sm off
189.Fl index No = Sy file
190.Sm on
191option can be used to specify a file whose handle will be returned if
192a directory is looked up using the public filehandle (
193.Tn WebNFS Ns ).
194This is to mimic the behavior of URLs.
195If no
196.Fl index
197option is specified, a directory filehandle will be returned as usual.
198The
199.Fl index
200option only makes sense in combination with the
201.Fl public
202or
203.Fl webnfs
204flags.
205.Pp
206The third component of a line specifies the host set to which the line applies.
207The set may be specified in three ways.
208The first way is to list the host name(s) separated by white space.
209(Standard Internet ``dot'' addresses may be used in place of names.)
210The second way is to specify a ``netgroup'' as defined in the netgroup file (see
211.Xr netgroup 5 ).
212The third way is to specify an Internet subnetwork using a network and
213network mask that is defined as the set of all hosts with addresses within
214the subnetwork.
215This latter approach requires less overhead within the
216kernel and is recommended for cases where the export line refers to a
217large number of clients within an administrative subnet.
218.Pp
219The first two cases are specified by simply listing the name(s) separated
220by whitespace.
221All names are checked to see if they are ``netgroup'' names
222first and are assumed to be hostnames otherwise.
223Using the full domain specification for a hostname can normally
224circumvent the problem of a host that has the same name as a netgroup.
225The third case is specified by the flag
226.Sm off
227.Fl network No = Sy netname
228.Sm on
229and optionally
230.Sm off
231.Fl mask No = Sy netmask .
232.Sm on
233If the mask is not specified, it will default to the mask for that network
234class (A, B or C; see
235.Xr inet 4 ).
236.Pp
237For example:
238.Bd -literal -offset indent
239/usr /usr/local -maproot=0:10 friends
240/usr -maproot=daemon grumpy.cis.uoguelph.ca 131.104.48.16
241/usr -ro -mapall=nobody
242/u -maproot=bin: -network 131.104.48 -mask 255.255.255.0
243/u2 -maproot=root friends
244/u2 -alldirs -kerb -network cis-net -mask cis-mask
245.Ed
246.Pp
247Given that
248.Sy /usr ,
249.Sy /u
250and
251.Sy /u2
252are
253local filesystem mount points, the above example specifies the following:
254.Sy /usr
255is exported to hosts
256.Em friends
257where friends is specified in the netgroup file
258with users mapped to their remote credentials and
259root mapped to uid 0 and group 10.
260It is exported read-write and the hosts in ``friends'' can mount either /usr
261or /usr/local.
262It is exported to
263.Em 131.104.48.16
264and
265.Em grumpy.cis.uoguelph.ca
266with users mapped to their remote credentials and
267root mapped to the user and groups associated with ``daemon'';
268it is exported to the rest of the world as read-only with
269all users mapped to the user and groups associated with ``nobody''.
270.Pp
271.Sy /u
272is exported to all hosts on the subnetwork
273.Em 131.104.48
274with root mapped to the uid for ``bin'' and with no group access.
275.Pp
276.Sy /u2
277is exported to the hosts in ``friends'' with root mapped to uid and groups
278associated with ``root'';
279it is exported to all hosts on network ``cis-net'' allowing mounts at any
280directory within /u2 and mapping all uids to credentials for the principal
281that is authenticated by a Kerberos ticket.
282.Pp
283The
284.Xr mountd 8
285utility can be made to re-read the
286.Nm
287file by sending it a hangup signal as follows:
288.Bd -literal -offset indent
289kill -s HUP `cat /var/run/mountd.pid`
290.Ed
291.Pp
292After sending the
293.Dv SIGHUP ,
294check the
295.Xr syslogd 8
296output to see whether
297.Xr mountd 8
298logged any parsing errors in the
299.Nm
300file.
301.Sh FILES
302.Bl -tag -width /etc/exports -compact
303.It Pa /etc/exports
304the default remote mount-point file
305.El
306.Sh SEE ALSO
307.Xr netgroup 5 ,
308.Xr mountd 8 ,
309.Xr nfsd 8 ,
310.Xr showmount 8
311.Sh BUGS
312The export options are tied to the local mount points in the kernel and
313must be non-contradictory for any exported subdirectory of the local
314server mount point.
315It is recommended that all exported directories within the same server
316filesystem be specified on adjacent lines going down the tree.
317You cannot specify a hostname that is also the name of a netgroup.
318Specifying the full domain specification for a hostname can normally
319circumvent the problem.
320