Dirk Wetter wrote:
>>> Is this a regression or is my memory wrong?
>> Your memory is correct. Secure by Default leaves rcpbind enabled (so
>> nmap will show port 111 as open), but it will only accept requests from
>> the local system. You can verify that rpcbind is in local-only mode as
>> follows:
>>
>> # svccfg -s rpc/bind listprop config/local_only
>> config/local_only  boolean  true
> 
> You hit the nail on the head: it's set to false and I didn't change it, see
> below.
> 
>> So your nmap output is not surprising, 
> 
> nmap -A checks amongst other things also the service behind it if a port
> appears to be open. Otherwise you wouldn't get the prog# of RPC services
> and the version of SSH used ;-)

Sorry, I didn't look closely enough at your nmap output. My point was 
that we would expect nmap to show that rpcbind is listening, even if 
config/local_only is set to true.

> 
>> but rpcinfo from a remote system should look like this:
>>
>> $ rpcinfo -p remotehost
>> rpcinfo: can't contact portmapper: RPC: Authentication error; why =
>> Failed (unspecified error)
> 
> Well, yes, this is what I would have expected.
> 
> Which system?

I produced the output above with a server running Nevada build 62. 
Should be the same for any post-SBD system.

> 
>> Since your system is responding to remote rpcinfo requests, it appears
>> that config/local_only is set to false. This may have occurred as a side
>> effect of enabling other services that require rpcbind. For example,
>> mounting or exporting an NFS file system would have this effect.
> 
> That's my point. It didn't set that manually, at least not that I am
> aware of.
> 
> One script during my post installation could have used the box as an NFS
> client though, if this is what you meant by side effect.
> 
> But a) system configurations should not change on the fly w/ the admin's
> knowledge  b) NFS *clients* should not need a portmapper which is
> accessible from remote.

I see your point. However, the principle we followed for Secure by 
Default was to ensure that network ports were not opened without 
*action* from the administrator, though action does not necessarily 
imply *knowledge*. In other words, you had to take explicit action to 
cause the NFS mount, but you might not have known that it would enable 
rpcbind as a side effect.

Even an NFS client requires lockd and statd in order to implement 
correct file locking semantics, and that's why rpcbind is needed.

        Scott

Reply via email to