<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NFS mount daemon Vulnerabilities in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537670#M26186</link>
    <description>Hi all&lt;BR /&gt;&lt;BR /&gt;on my S800 Server with HP-UX 11.0 the NFS mount daemon (mountd) is operating on an unreserved port &lt;BR /&gt;&lt;BR /&gt;This daemon is probably vulnerable to port hijacking and should be moved to a reserved port.&lt;BR /&gt;&lt;BR /&gt;Which Ports are privileged and is there an Patch for this or how can i let the damon run only on reserved Ports ?&lt;BR /&gt;&lt;BR /&gt;Thanks in Advance</description>
    <pubDate>Thu, 07 Jun 2001 07:48:21 GMT</pubDate>
    <dc:creator>Thomas Pohlen</dc:creator>
    <dc:date>2001-06-07T07:48:21Z</dc:date>
    <item>
      <title>NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537670#M26186</link>
      <description>Hi all&lt;BR /&gt;&lt;BR /&gt;on my S800 Server with HP-UX 11.0 the NFS mount daemon (mountd) is operating on an unreserved port &lt;BR /&gt;&lt;BR /&gt;This daemon is probably vulnerable to port hijacking and should be moved to a reserved port.&lt;BR /&gt;&lt;BR /&gt;Which Ports are privileged and is there an Patch for this or how can i let the damon run only on reserved Ports ?&lt;BR /&gt;&lt;BR /&gt;Thanks in Advance</description>
      <pubDate>Thu, 07 Jun 2001 07:48:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537670#M26186</guid>
      <dc:creator>Thomas Pohlen</dc:creator>
      <dc:date>2001-06-07T07:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537671#M26187</link>
      <description>Security in mountd may be implemented using the /etc/export file and say what access implement: hostname, netgroup, dns suffix, etc. With the command 'exportfs' you can actualize your exports options.&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2001 12:09:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537671#M26187</guid>
      <dc:creator>Manuel P. Ron</dc:creator>
      <dc:date>2001-06-07T12:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537672#M26188</link>
      <description>BTW, security and ports aren't related.  In fact, one might argue that things that run as root on reserved ports are actually more insecure than things that run as unpriv'd users on unreserved ports. &lt;BR /&gt;&lt;BR /&gt;If you run unpatched BIND (DNS), then it probably runs as root.  If someone compromises it, they're now root.  The fact that BIND runs on a reserved port didn't help at all.&lt;BR /&gt;&lt;BR /&gt;The key is making sure your application is well patched and secured regardless of port.</description>
      <pubDate>Thu, 07 Jun 2001 12:33:17 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537672#M26188</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-06-07T12:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537673#M26189</link>
      <description>BTW, ports are specified by RFC 1700:&lt;BR /&gt;&lt;A href="http://www.csl.sony.co.jp/cgi-bin/hyperrfc?1700" target="_blank"&gt;http://www.csl.sony.co.jp/cgi-bin/hyperrfc?1700&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;search for &lt;BR /&gt;WELL KNOWN PORTS&lt;BR /&gt;in a case sensitive manner.&lt;BR /&gt;&lt;BR /&gt;Port numbers 0 through 1023 are assigned by RFC 1700. This RFC also lists the conventional use of various ports with numbers greater than&lt;BR /&gt;1023.&lt;BR /&gt;&lt;BR /&gt;Your program must initially run as root to bind to a port &amp;lt;= 1023.&lt;BR /&gt;</description>
      <pubDate>Thu, 07 Jun 2001 17:01:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537673#M26189</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-06-07T17:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537674#M26190</link>
      <description>Thomas,&lt;BR /&gt;&lt;BR /&gt;HP is compatible with Sun who provides the "ONC" code, in that rpc.mountd listens on a port # greater than 1023.   There is a -p options for rpc.mountd to allow incoming mount requests from non-privileged port numbers.  By default rpc.mountd restricts incoming mount requests to come only from privileged ports (less than 1024).   &lt;BR /&gt;&lt;BR /&gt;Brian Hackley</description>
      <pubDate>Tue, 12 Jun 2001 14:35:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537674#M26190</guid>
      <dc:creator>Brian Hackley</dc:creator>
      <dc:date>2001-06-12T14:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: NFS mount daemon Vulnerabilities</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537675#M26191</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;In order to have the functionality Brian mentioned, make sure&lt;BR /&gt;you have patch PHNE_23249 plus dependencies (it could have been replaced by a new version, please check), this will also give you NFS over TCP which despite the fact that it carries more overhead is a bit more secure. The man page claims that rpc.mountd has a an option named '-e' which forces rpc.mountd to be invoked every time it has to service a request (instead of running like a daemon) and to check on /var/adm/inetd.sec for which IP addresses is allowed to talk to. I have not been able to make it run though, rpc.mountd does not recognize the '-e' option&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Tue, 12 Jun 2001 18:30:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/nfs-mount-daemon-vulnerabilities/m-p/2537675#M26191</guid>
      <dc:creator>Alberto Minichiello</dc:creator>
      <dc:date>2001-06-12T18:30:46Z</dc:date>
    </item>
  </channel>
</rss>

