Am 11.06.2007 23:17, Scott Rotondo schrieb:

>> nmap -A checks amongst other things also the service behind it if a port
>> appears to be open. Otherwise you wouldn't get the prog# of RPC services
>> and the version of SSH used ;-)
> 
> Sorry, I didn't look closely enough at your nmap output. My point was
> that we would expect nmap to show that rpcbind is listening, even if
> config/local_only is set to true.
> 
>>
>>> but rpcinfo from a remote system should look like this:
>>>
>>> $ rpcinfo -p remotehost
>>> rpcinfo: can't contact portmapper: RPC: Authentication error; why =
>>> Failed (unspecified error)
>>
>> Well, yes, this is what I would have expected.
>>
>> Which system?
> 
> I produced the output above with a server running Nevada build 62.
> Should be the same for any post-SBD system.

Thanks for the confirmation, it was only that the "magic" I experienced
made me somewhat skeptical.

>>> Since your system is responding to remote rpcinfo requests, it appears
>>> that config/local_only is set to false. This may have occurred as a side
>>> effect of enabling other services that require rpcbind. For example,
>>> mounting or exporting an NFS file system would have this effect.
>>
>> That's my point. It didn't set that manually, at least not that I am
>> aware of.
>>
>> One script during my post installation could have used the box as an NFS
>> client though, if this is what you meant by side effect.
>>
>> But a) system configurations should not change on the fly w/ the admin's
>> knowledge  b) NFS *clients* should not need a portmapper which is
>> accessible from remote.
> 
> I see your point. However, the principle we followed for Secure by
> Default was to ensure that network ports were not opened without
> *action* from the administrator, though action does not necessarily
> imply *knowledge*. In other words, you had to take explicit action to
> cause the NFS mount, but you might not have known that it would enable
> rpcbind as a side effect.
>
> Even an NFS client requires lockd and statd in order to implement
> correct file locking semantics, and that's why rpcbind is needed.

Thanks, yes, a while after sending the e-mail I realized that, too. :-)

But the situtation is still kind of awkward: Now I still have the
portmapper accessible, and for sure lockd/statd doesn't run now.
(Can't tell whether it ran before, if not, the logic you're telling
is not comprehensible to me). I know that there might be another
explanation, but what counts is that the level of security was/is reduced.

An important other thing: In this scenario the portmapper doesn't syslog
*anything* (info priority) which is not what a security conscious person
wants. This should be changed IMO...


Cheers,
        Dirk




-- 
Dirk Wetter @ Dr. Wetter IT Consulting          http://drwetter.org
Beratung IT-Sicherheit + Open Source
Key fingerprint = 2AD6 BE0F 9863 C82D 21B3  64E5 C967 34D8 11B7 C62F

-
Found core file older than 7 days: /usr/share/man/man5/core.5.gz



Reply via email to