5.13. Securing RPC services (2024)

You should disable RPC if you do not need it.

Remote Procedure Call (RPC) is a protocol that programs can use to request services from other programs located on different computers. The portmap service controls RPC services by mapping RPC program numbers into DARPA protocol port numbers; it must be running in order to make RPC calls.

RPC-based services have had a bad record of security holes, although the portmapper itself hasn't (but still provides information to a remote attacker). Notice that some of the DDoS (distributed denial of service) attacks use RPC exploits to get into the system and act as a so called agent/handler.

You only need RPC if you are using an RPC-based service. The most common RPC-based services are NFS (Network File System) and NIS (Network Information System). See the previous section for more information about NIS. The File Alteration Monitor (FAM) provided by the package fam is also an RPC service, and thus depends on portmap.

NFS services are quite important in some networks. If that is the case for you, then you will need to find a balance of security and usability for your network (you can read more about NFS security in the http://www.tldp.org/HOWTO/NFS-HOWTO.html (/usr/share/doc/HOWTO/en-txt/NFS-HOWTO.txt.gz)).

5.13.1.Disabling RPC services completely

Disabling portmap is quite simple. There are several different methods. The simplest one in a Debian 3.0 system and later releases is to uninstall the portmap package. If you are running an older Debian version you will have to disable the service as seen in Section3.5.1, “Disabling daemon services”, because the program is part of the netbase package (which cannot be de-installed without breaking the system).

Notice that some desktop environments (notably, GNOME) use RPC services and need the portmapper for some of the file management features. If this is your case, you can limit the access to RPC services as described below.

5.13.2.Limiting access to RPC services

Unfortunately, in some cases removing RPC services from the system is not an option. Some local desktop services (notably SGI's fam) are RPC based and thus need a local portmapper. This means that under some situations, users installing a desktop environment (like GNOME) will install the portmapper too.

There are several ways to limit access to the portmapper and to RPC services:

  • Block access to the ports used by these services with a local firewall (see Section5.14, “Adding firewall capabilities”).

  • Block access to these services using tcp wrappers, since the portmapper (and some RPC services) are compiled with libwrap (see Section4.12, “Using tcpwrappers”). This means that you can block access to them through the hosts.allow and hosts.deny tcp wrappers configuration.

  • Since version 5-5, the portmap package can be configured to listen only on the loopback interface. To do this, modify /etc/default/portmap, uncomment the following line: #OPTIONS="-i 127.0.0.1" and restart the portmapper. This is sufficient to allow local RPC services to work while at the same time prevents remote systems from accessing them (see, however, Section4.18.5, “Disabling weak-end hosts issues”).

5.13. Securing RPC services (2024)

FAQs

How to secure RPC server? ›

The client and the server each have their own private key (sometimes called a secret key) which they use together with the public key to devise a common key. They use the common key to communicate with each other, by using an agreed-upon encryption/decryption function (such as DES).

What is service RPC services? ›

A Remote Procedure Call (RPC) is a software communication protocol that one program uses to request a service from another program located on a different computer and network, without having to understand the network's details.

Is it safe to disable RPC? ›

Microsoft recommends that you don't disable the RPC service.

Is RPC a security risk? ›

While XML-RPC offers simplicity and ease of use, it is important to know the security risks associated with its implementation. Vulnerability in XML-RPC allows an attacker to make a system call, which can be dangerous for the application and servers.

What is RPC server for? ›

What is RPC? A remote procedure call (RPC) is a protocol that allows different processes on a computer to communicate with each other to perform a task. An RPC server is unavailable error occurs when a Windows PC cannot communicate with another computer on the same network.

Is RPC over HTTP Secure? ›

RPC over HTTP provides three types of security in addition to standard RPC security, which results in RPC over HTTP traffic being protected once by RPC, and then doubly protected by the tunneling mechanism provided by RPC over HTTP.

How do I check my RPC service? ›

To check whether the RPC and WMI Services are running in the remote machine:
  1. In the remote machine, go to Start → Run → services. msc.
  2. Check whether the services Remote Procedure Call and Windows Management Instrumentation are running. If not, start those services.

What are the examples of RPC service? ›

Example Applications
  • Remote File access. Remote file and database access was one of the earliest uses of RPC. ...
  • Remote Graphics. ...
  • Remote software task management Load/Start/Control. ...
  • Other Examples.

What is RPC used for? ›

Remote Procedure Call (RPC) protocol is generally used to communicate between processes on different workstations. However, RPC works just as well for communication between different processes on the same workstation.

Is RPC a vulnerability? ›

Vulnerability Overview:

RPC is a communication method for calling and executing programs from other terminals connected to the network. CVE-2022-26809 is a remote code execution vulnerability in Microsoft RPC runtime and affects Windows.

Can you disable RPC service? ›

Limiting access to RPC services. Unfortunately, in some cases removing RPC services from the system is not an option. Some local desktop services (notably SGI's fam) are RPC based and thus need a local portmapper.

Do people still use RPC? ›

However, RPC still exists and is used when it suits the use case better. Modern implementations of RPC, such as gRPC, are now more popular. For some use cases, gRPC performs better than RPC and REST. It allows streaming client-server communications rather than the request-and-respond data exchange pattern.

What are the cons of RPC? ›

Disadvantages of RPC

RPC involves more coupling—its methods can be a leaky abstraction.

Is RPC a web service? ›

There are a few central types of web services: XML-RPC, UDDI, SOAP, and REST: XML-RPC (Remote Procedure Call) is the most basic XML protocol to exchange data between a wide variety of devices on a network. It uses HTTP to quickly and easily transfer data and communication other information from client to server.

What is RPC authentication? ›

The authentication services on the server host system provide RPC authentication. Applications use authenticated remote procedure calls to ensure that all calls come from authorized clients. They can also help ensure that all server replies come from authenticated servers.

How do I secure my remote access server? ›

Basic Security Tips for Remote Desktop
  1. Use strong passwords. ...
  2. Use Two-factor authentication. ...
  3. Update your software. ...
  4. Restrict access using firewalls. ...
  5. Enable Network Level Authentication. ...
  6. Limit users who can log in using Remote Desktop. ...
  7. Set an account lockout policy.

How do I secure my public web server? ›

Key Steps to Make Your Web Server Secure
  1. Create strong passwords.
  2. Generate an SSH key pair.
  3. Keep your server updated.
  4. Use firewalls.
  5. Consider using Linux as your web server operating system.
  6. Limit superuser/root access.
  7. Utilize VPNs and private networks.
  8. Use a multi-server environment.
Aug 15, 2024

How do I secure my public facing server? ›

We recommend that you place it on a separate, protected subnetwork. This will ensure that traffic between the Internet and the server does not traverse any part of your private internal network and that no internal network traffic is visible to the server.

How do I make my server secure? ›

So, here's a checklist to make sure your server's security is not compromised in any way.
  1. Use local firewall rules. ...
  2. Think twice before sharing any data: ...
  3. Enforce a strong password policy. ...
  4. Create individual administrative accounts: ...
  5. SQL server instances: ...
  6. Windows updates: ...
  7. Always have a backup plan: ...
  8. Code it right:

Top Articles
Why I Rarely Talk About Our Family's Debt-Free Journey
7 Things We Stopped Doing To Save Money
Scheelzien, volwassenen - Alrijne Ziekenhuis
Hotels Near 6491 Peachtree Industrial Blvd
Xre-02022
Worcester Weather Underground
Cappacuolo Pronunciation
It may surround a charged particle Crossword Clue
Air Canada bullish about its prospects as recovery gains steam
Devotion Showtimes Near Mjr Universal Grand Cinema 16
Byrn Funeral Home Mayfield Kentucky Obituaries
Hk Jockey Club Result
David Packouz Girlfriend
Nikki Catsouras Head Cut In Half
Volstate Portal
Osrs Blessed Axe
Culos Grandes Ricos
David Turner Evangelist Net Worth
Google Feud Unblocked 6969
Tcu Jaggaer
Images of CGC-graded Comic Books Now Available Using the CGC Certification Verification Tool
라이키 유출
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
Unterwegs im autonomen Freightliner Cascadia: Finger weg, jetzt fahre ich!
Www.paystubportal.com/7-11 Login
Lbrands Login Aces
Ncal Kaiser Online Pay
Himekishi Ga Classmate Raw
Ugly Daughter From Grown Ups
Helloid Worthington Login
Warn Notice Va
Missing 2023 Showtimes Near Mjr Southgate
Autopsy, Grave Rating, and Corpse Guide in Graveyard Keeper
Flaky Fish Meat Rdr2
Watchdocumentaries Gun Mayhem 2
Colorado Parks And Wildlife Reissue List
Srg Senior Living Yardi Elearning Login
Jewish Federation Of Greater Rochester
Hazel Moore Boobpedia
Arch Aplin Iii Felony
5103 Liberty Ave, North Bergen, NJ 07047 - MLS 240018284 - Coldwell Banker
A jovem que batizou lei após ser sequestrada por 'amigo virtual'
25100 N 104Th Way
Game Like Tales Of Androgyny
Peugeot-dealer Hedin Automotive: alles onder één dak | Hedin
28 Mm Zwart Spaanplaat Gemelamineerd (U999 ST9 Matte | RAL9005) Op Maat | Zagen Op Mm + ABS Kantenband
How Did Natalie Earnheart Lose Weight
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Asisn Massage Near Me
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6162

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.