Just wanted to pass along something that threw me for a quick loop in hopes it 
might save someone else time.  I needed to disable the snmpXdmid service on a 
recent S10u4 build.  This is accomplished using:

# svcadm disable dmi

However  After running the command, the security scanner still detected the 
service as being active.  The test is looking for a response form RPC program # 
100249.

A bit of research told me that until the system either reboots or the 
portmapper (rpc/bind) is tickled, the snmpXdmid service remains registered.  I 
did a quick scan of the svc method (/lib/svc/method/svc-dmi) and modified the 
stop code block slightly to fix it.  The line looks like this before 
modification:

/usr/bin/pkill -9 -x -u 0 -z ${_INIT_ZONENAME:=`/sbin/zonename`} 
'(snmpXdmid|dmispd)'

By modifying it as follows I was able to correct the problem with snmpXdmid:

/usr/bin/pkill -9 -x -u 0 -z ${_INIT_ZONENAME:=`/sbin/zonename`} \
            '(snmpXdmid|dmispd)' && /usr/bin/rpcinfo -d 100249 1

At first glance it seems this may be a bug in the method, although I'm sure its 
far from a priority.  I dug through SunSolve and more Google hits than I care 
to recall and didn't find anything indicating this was a known issue, so 
hopefully this will get indexed and save someone some time...
 
 
This message posted from opensolaris.org
_______________________________________________
opensolaris-discuss mailing list
[email protected]

Reply via email to