<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ipfilter and ypserv in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265740#M569341</link>
    <description>I have fixed the problem. I installed and comfigured IPFilters last night.&lt;BR /&gt;&lt;BR /&gt;The problem is that other networks at our company could see our NIS+ domain. A security audit was performed a few weeks ago and it was found that our passwd file potentially could be read because we are running NIS+ in YP compatabiity mode. The reason we enabled this mode is because we have some Alphas running Tru64 which does not support NIS+. So, the normal NIS tricks like setting up an /etc/securenets file doesn't work with NIS+. Plus, I could not find a way (nor could HP) to lock down the ports that NIS+ uses.&lt;BR /&gt;&lt;BR /&gt;I am now able to block just the two nisd ports eventhough the port numbers change each time NIS+ is started. I created a simple perl script that is called from the /sbin/init.d/nisplus.server start/stop script. The Perl script runs "rpcinfo -p | grep nisd", extracts the two port numbers, and writes a file called "/etc/ipf-nisplus.conf". The nisplus.server script then does an 'ipf -f /etc/ipf-nisplus.conf' in the start) section. Also, the nisplus.server script does an 'ipf -r -f /etc/ipf-nisplus.com' in the stop) section.&lt;BR /&gt;&lt;BR /&gt;The /etc/ipf-nisplus.conf file looks like:&lt;BR /&gt;&lt;BR /&gt;block in log from any to any port = 700&lt;BR /&gt;pass in from xxx.yyy.zzz.0/24 to any port = 700&lt;BR /&gt;block in log from any to any port = 701&lt;BR /&gt;pass in from xxx.yyy.zzz.0/24 to any port = 701&lt;BR /&gt;&lt;BR /&gt;Of course, the port numbers will be different each time.&lt;BR /&gt;&lt;BR /&gt;Does this kludge sound like a reasonable solution to the prblem?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Steven&lt;BR /&gt;</description>
    <pubDate>Tue, 04 May 2004 10:51:30 GMT</pubDate>
    <dc:creator>Steven Whatley</dc:creator>
    <dc:date>2004-05-04T10:51:30Z</dc:date>
    <item>
      <title>ipfilter and ypserv</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265737#M569338</link>
      <description>Hello all,&lt;BR /&gt;&lt;BR /&gt;I am running HP-UX 11.00.  How do I tell ipfilter to block NIS ypserv connections?  ypserv is given a different port by portmap each time NIS starts.  &lt;BR /&gt;&lt;BR /&gt;I know about /etc/securenets but I am actually running NIS+ which doesn't use this file.  I need to block all ypserv connections from out side of our subnet.&lt;BR /&gt;&lt;BR /&gt;Any info will be appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Steven&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 03 May 2004 09:25:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265737#M569338</guid>
      <dc:creator>Steven Whatley</dc:creator>
      <dc:date>2004-05-03T09:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter and ypserv</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265738#M569339</link>
      <description>Can't you lock ypserv to a port?  From the man on ypserv:&lt;BR /&gt;&lt;BR /&gt;" -p --port port&lt;BR /&gt;ypserv will bind itself to this port.  This makes it possible to have a router filter packets to the NIS ports, so that access to the NIS server from hosts on the Internet can be restricted."&lt;BR /&gt;&lt;BR /&gt;Then it should be easy to block them.&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 03 May 2004 13:19:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265738#M569339</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2004-05-03T13:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter and ypserv</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265739#M569340</link>
      <description>I am actually running NIS+ and after talking with HP ITRC support, we could not come up with any way to lockdown the nisd daemon to a specific port.  Acually, nisd listens on two ports because we are running NIS+ in YP-compatability.  nisd seems to be getting its port numbers from RPC's portmapper. :(&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Steven&lt;BR /&gt;</description>
      <pubDate>Mon, 03 May 2004 14:09:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265739#M569340</guid>
      <dc:creator>Steven Whatley</dc:creator>
      <dc:date>2004-05-03T14:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: ipfilter and ypserv</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265740#M569341</link>
      <description>I have fixed the problem. I installed and comfigured IPFilters last night.&lt;BR /&gt;&lt;BR /&gt;The problem is that other networks at our company could see our NIS+ domain. A security audit was performed a few weeks ago and it was found that our passwd file potentially could be read because we are running NIS+ in YP compatabiity mode. The reason we enabled this mode is because we have some Alphas running Tru64 which does not support NIS+. So, the normal NIS tricks like setting up an /etc/securenets file doesn't work with NIS+. Plus, I could not find a way (nor could HP) to lock down the ports that NIS+ uses.&lt;BR /&gt;&lt;BR /&gt;I am now able to block just the two nisd ports eventhough the port numbers change each time NIS+ is started. I created a simple perl script that is called from the /sbin/init.d/nisplus.server start/stop script. The Perl script runs "rpcinfo -p | grep nisd", extracts the two port numbers, and writes a file called "/etc/ipf-nisplus.conf". The nisplus.server script then does an 'ipf -f /etc/ipf-nisplus.conf' in the start) section. Also, the nisplus.server script does an 'ipf -r -f /etc/ipf-nisplus.com' in the stop) section.&lt;BR /&gt;&lt;BR /&gt;The /etc/ipf-nisplus.conf file looks like:&lt;BR /&gt;&lt;BR /&gt;block in log from any to any port = 700&lt;BR /&gt;pass in from xxx.yyy.zzz.0/24 to any port = 700&lt;BR /&gt;block in log from any to any port = 701&lt;BR /&gt;pass in from xxx.yyy.zzz.0/24 to any port = 701&lt;BR /&gt;&lt;BR /&gt;Of course, the port numbers will be different each time.&lt;BR /&gt;&lt;BR /&gt;Does this kludge sound like a reasonable solution to the prblem?&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Steven&lt;BR /&gt;</description>
      <pubDate>Tue, 04 May 2004 10:51:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ipfilter-and-ypserv/m-p/3265740#M569341</guid>
      <dc:creator>Steven Whatley</dc:creator>
      <dc:date>2004-05-04T10:51:30Z</dc:date>
    </item>
  </channel>
</rss>

