Remote boot of a diskless Linux client for operating system integrity.
MetadataShow full item record
These instructions describe how to build a diskless client with dedicated user storage on the server. The diskless Linux client is organized to provide read-write files over NFS at /home, read-only files over NFS for accessing bulky immutable utilities, and some volatile RAM disk files to allow the Linux Kernel to boot. This approach is exceptional because 1) the client system is diskless; system administration is managed at a single server, and 2) it is more secure; the only data that can be modified is user data under the /home directory. Although these instructions describe setup between a Linux client and a Linux server, the Linux client can boot from any server with BOOTP, TFTP and NFS services installed.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
NPS Report NumberNPS-CS-02-002
Showing items related by title, author, creator and subject.
Implementation of a hypertext transfer protocol server on a high assurance multilevel secure platform Bersack, Evelyn Louise (Monterey, California. Naval Postgraduate School, 2000);In a client/server environment on a local area network (LAN), a server should provide various network applications including a hypertext transfer protocol (HTTP) server. HTTP is a client/server, request/response application ...
Plutchak, Bruce D (Monterey, California. Naval Postgraduate School, 1997-09);This thesis focuses on the design and implementation of a new interface editor for the Computer-Aided Prototyping System (CAPS), which de- couples the user interface from the real-time prototype. Using this design, a CAPS ...
Chua, Eng Hong (Monterey, California. Naval Postgraduate School, 2003-03);Contemporary large-scale networked systems have improved the efficiency and effectiveness of our way of life. However, such benefit is accompanied by elevated risks of intrusion and compromises. Incorporating survivability ...