Dirk Wetter wrote:
>>> Is this a regression or is my memory wrong?
>> Your memory is correct. Secure by Default leaves rcpbind enabled (so
>> nmap will show port 111 as open), but it will only accept requests from
>> the local system. You can verify that rpcbind is in local-only mode as
>> follows:
>>
>> # svccfg -s rpc/bind listprop config/local_only
>> config/local_only boolean true
>
> You hit the nail on the head: it's set to false and I didn't change it, see
> below.
>
>> So your nmap output is not surprising,
>
> nmap -A checks amongst other things also the service behind it if a port
> appears to be open. Otherwise you wouldn't get the prog# of RPC services
> and the version of SSH used ;-)
Sorry, I didn't look closely enough at your nmap output. My point was
that we would expect nmap to show that rpcbind is listening, even if
config/local_only is set to true.
>
>> but rpcinfo from a remote system should look like this:
>>
>> $ rpcinfo -p remotehost
>> rpcinfo: can't contact portmapper: RPC: Authentication error; why =
>> Failed (unspecified error)
>
> Well, yes, this is what I would have expected.
>
> Which system?
I produced the output above with a server running Nevada build 62.
Should be the same for any post-SBD system.
>
>> Since your system is responding to remote rpcinfo requests, it appears
>> that config/local_only is set to false. This may have occurred as a side
>> effect of enabling other services that require rpcbind. For example,
>> mounting or exporting an NFS file system would have this effect.
>
> That's my point. It didn't set that manually, at least not that I am
> aware of.
>
> One script during my post installation could have used the box as an NFS
> client though, if this is what you meant by side effect.
>
> But a) system configurations should not change on the fly w/ the admin's
> knowledge b) NFS *clients* should not need a portmapper which is
> accessible from remote.
I see your point. However, the principle we followed for Secure by
Default was to ensure that network ports were not opened without
*action* from the administrator, though action does not necessarily
imply *knowledge*. In other words, you had to take explicit action to
cause the NFS mount, but you might not have known that it would enable
rpcbind as a side effect.
Even an NFS client requires lockd and statd in order to implement
correct file locking semantics, and that's why rpcbind is needed.
Scott