| (Each chapter concludes with a Summary.) | |
| Preface | |
| Introduction | |
| File Access and File Transfer | |
| Early File Access Protocols | |
| ONC RPC | |
| Organization of This Book | |
| XDR—External Data Representation | |
| Protocols and Transportable Data | |
| A Canonical Standard | |
| XDR Unit | |
| Primitive XDR Data Types | |
| Integer | |
| Unsigned Integer | |
| Boolean | |
| Hyper Integer and Unsigned Hyper Integer | |
| Fixed-Length Opaque Data | |
| Variable-Length Opaque Data String | |
| Structured XDR Data Types | |
| Fixed-Length Array | |
| Variable-Length Array | |
| Discriminated Union | |
| Linked Lists | |
| XDR Language | |
| Notational Conventions | |
| Lexical Notes | |
| Syntax Information | |
| Syntax Notes | |
| Example of an XDR Data Description | |
| XDR Language Variant in This Book | |
| ONC RPC | |
| Remote Procedure Call Model | |
| RPC Transport Independence and Semantics | |
| Program Numbers and Versioning | |
| Requirements of the RPC Protocol | |
| RPC Call Message | |
| RPC Reply Message | |
| Record-Marking Standard | |
| Portmapper and Rpcbind | |
| Portmap Protocol | |
| Rpcbind Protocol | |
| RPC Authentication | |
| RPC Credential and Verifier | |
| Authentication Flavors | |
| Null Authentication | |
| System Authentication | |
| Diffie-Hellman Authentication | |
| Naming | |
| DH Authentication Verifiers | |
| Nicknames and Clock Synchronization | |
| DH Authentication Protocol | |
| DH Full Network Name Credential and Verifier | |
| DH Nickname Credential and Verifier | |
| Server Verifier | |
| Diffie-Hellman Encryption | |
| Weaknesses of DH Authentication | |
| Kerberos Version 4 Authentication | |
| Kerberos Naming | |
| Kerberos-Based Authentication Protocol Specification | |
| Kerberos Full Network Name Credential and Verifier | |
| Kerberos Nickname Credential and Verifier | |
| Server Verifier | |
| Kerberos-Specific Authentication Status | |
| Values | |
| Weaknesses of Kerberos Authentication | |
| RPCSEC__GSS Authentication | |
| RPCSEC__GSS Security Protocol | |
| RPCSEC-GSS Credential | |
| Context Creation | |
| Successful Creation Response | |
| Unsuccessful Context Creation | |
| RPC Data Exchange | |
| Data Integrity Protection | |
| Data Privacy | |
| Server Processing of RPC Data Requests | |
| Server's Reply | |
| RPCSEC-GSS Errors | |
| Performance of RPCSEC-GSS. Snoop Trace of Session | |
| Connection-Based Security | |
| NFS Filesystem Model | |
| Filesystem and Filesystem Objects | |
| Filehandles | |
| Pathnames | |
| Filename Component Handling | |
| Pathname Evaluation | |
| Stateless Server | |
| Server Recovery | |
| Idempotent Operations | |
| Statelessness and High Availability | |
| NFS Version 2 Common Data Types | |
| Server Procedures | |
| NULL—Do Nothing | |
| GETATTR—Get File Attributes | |
| SETATTR—Set File Attributes | |
| LOOKUP—Look Up File Name | |
| READLINK—Read from Symbolic Link | |
| READ—Read from File | |
| WRITE—Write to File | |
| CREATE—Create File | |
| REMOVE—Remove File | |
| RENAME—Rename File | |
| LINK—Create Link to File | |
| SYMLINK—Create Symbolic Link | |
| MKDIR—Create Directory | |
| RMDIR—Remove Directory | |
| READDIR—Read from Directory | |
| STATFS—Get Filesystem Attributes | |
| NFS Version | |
| Changes from the NFS Version 2 Protocol | |
| Deleted Procedures | |
| Modified Procedures | |
| New Procedures | |
| Filehandle Size | |
| Maximum Data Sizes | |
| Error Return | |
| File Type | |
| File Attributes | |
| Set File Attributes. 32-Bit Clients/Servers and 64-Bit | |
| Clients/Servers | |
| Basic Data Types | |
| Sizes | |
| Basic Data Types | |
| Server Procedures | |
| NULL—Do Nothing | |
| GETATTR—Get File Attributes S | |
| Table of Contents provided by Publisher. All Rights Reserved. |