- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- NFS mount daemon Vulnerabilities
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-07-2001 12:48 AM
тАО06-07-2001 12:48 AM
NFS mount daemon Vulnerabilities
on my S800 Server with HP-UX 11.0 the NFS mount daemon (mountd) is operating on an unreserved port
This daemon is probably vulnerable to port hijacking and should be moved to a reserved port.
Which Ports are privileged and is there an Patch for this or how can i let the damon run only on reserved Ports ?
Thanks in Advance
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-07-2001 05:09 AM
тАО06-07-2001 05:09 AM
Re: NFS mount daemon Vulnerabilities
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-07-2001 05:33 AM
тАО06-07-2001 05:33 AM
Re: NFS mount daemon Vulnerabilities
If you run unpatched BIND (DNS), then it probably runs as root. If someone compromises it, they're now root. The fact that BIND runs on a reserved port didn't help at all.
The key is making sure your application is well patched and secured regardless of port.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-07-2001 10:01 AM
тАО06-07-2001 10:01 AM
Re: NFS mount daemon Vulnerabilities
http://www.csl.sony.co.jp/cgi-bin/hyperrfc?1700
search for
WELL KNOWN PORTS
in a case sensitive manner.
Port numbers 0 through 1023 are assigned by RFC 1700. This RFC also lists the conventional use of various ports with numbers greater than
1023.
Your program must initially run as root to bind to a port <= 1023.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-12-2001 07:35 AM
тАО06-12-2001 07:35 AM
Re: NFS mount daemon Vulnerabilities
HP is compatible with Sun who provides the "ONC" code, in that rpc.mountd listens on a port # greater than 1023. There is a -p options for rpc.mountd to allow incoming mount requests from non-privileged port numbers. By default rpc.mountd restricts incoming mount requests to come only from privileged ports (less than 1024).
Brian Hackley
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-12-2001 11:30 AM
тАО06-12-2001 11:30 AM
Re: NFS mount daemon Vulnerabilities
In order to have the functionality Brian mentioned, make sure
you have patch PHNE_23249 plus dependencies (it could have been replaced by a new version, please check), this will also give you NFS over TCP which despite the fact that it carries more overhead is a bit more secure. The man page claims that rpc.mountd has a an option named '-e' which forces rpc.mountd to be invoked every time it has to service a request (instead of running like a daemon) and to check on /var/adm/inetd.sec for which IP addresses is allowed to talk to. I have not been able to make it run though, rpc.mountd does not recognize the '-e' option
Regards