5.13. Securing RPC services (2024)

You should disable RPC if you do not need it.

Remote Procedure Call (RPC) is a protocol that programs can use to request services from other programs located on different computers. The portmap service controls RPC services by mapping RPC program numbers into DARPA protocol port numbers; it must be running in order to make RPC calls.

RPC-based services have had a bad record of security holes, although the portmapper itself hasn't (but still provides information to a remote attacker). Notice that some of the DDoS (distributed denial of service) attacks use RPC exploits to get into the system and act as a so called agent/handler.

You only need RPC if you are using an RPC-based service. The most common RPC-based services are NFS (Network File System) and NIS (Network Information System). See the previous section for more information about NIS. The File Alteration Monitor (FAM) provided by the package fam is also an RPC service, and thus depends on portmap.

NFS services are quite important in some networks. If that is the case for you, then you will need to find a balance of security and usability for your network (you can read more about NFS security in the http://www.tldp.org/HOWTO/NFS-HOWTO.html (/usr/share/doc/HOWTO/en-txt/NFS-HOWTO.txt.gz)).

5.13.1.Disabling RPC services completely

Disabling portmap is quite simple. There are several different methods. The simplest one in a Debian 3.0 system and later releases is to uninstall the portmap package. If you are running an older Debian version you will have to disable the service as seen in Section3.5.1, “Disabling daemon services”, because the program is part of the netbase package (which cannot be de-installed without breaking the system).

Notice that some desktop environments (notably, GNOME) use RPC services and need the portmapper for some of the file management features. If this is your case, you can limit the access to RPC services as described below.

5.13.2.Limiting access to RPC services

Unfortunately, in some cases removing RPC services from the system is not an option. Some local desktop services (notably SGI's fam) are RPC based and thus need a local portmapper. This means that under some situations, users installing a desktop environment (like GNOME) will install the portmapper too.

There are several ways to limit access to the portmapper and to RPC services:

  • Block access to the ports used by these services with a local firewall (see Section5.14, “Adding firewall capabilities”).

  • Block access to these services using tcp wrappers, since the portmapper (and some RPC services) are compiled with libwrap (see Section4.12, “Using tcpwrappers”). This means that you can block access to them through the hosts.allow and hosts.deny tcp wrappers configuration.

  • Since version 5-5, the portmap package can be configured to listen only on the loopback interface. To do this, modify /etc/default/portmap, uncomment the following line: #OPTIONS="-i 127.0.0.1" and restart the portmapper. This is sufficient to allow local RPC services to work while at the same time prevents remote systems from accessing them (see, however, Section4.18.5, “Disabling weak-end hosts issues”).

5.13. Securing RPC services (2024)

FAQs

How to secure RPC server? ›

The client and the server each have their own private key (sometimes called a secret key) which they use together with the public key to devise a common key. They use the common key to communicate with each other, by using an agreed-upon encryption/decryption function (such as DES).

What is service RPC services? ›

A Remote Procedure Call (RPC) is a software communication protocol that one program uses to request a service from another program located on a different computer and network, without having to understand the network's details.

Is it safe to disable RPC? ›

Microsoft recommends that you don't disable the RPC service.

Is RPC a security risk? ›

While XML-RPC offers simplicity and ease of use, it is important to know the security risks associated with its implementation. Vulnerability in XML-RPC allows an attacker to make a system call, which can be dangerous for the application and servers.

What is RPC server for? ›

What is RPC? A remote procedure call (RPC) is a protocol that allows different processes on a computer to communicate with each other to perform a task. An RPC server is unavailable error occurs when a Windows PC cannot communicate with another computer on the same network.

Is RPC over HTTP Secure? ›

RPC over HTTP provides three types of security in addition to standard RPC security, which results in RPC over HTTP traffic being protected once by RPC, and then doubly protected by the tunneling mechanism provided by RPC over HTTP.

How do I check my RPC service? ›

To check whether the RPC and WMI Services are running in the remote machine:
  1. In the remote machine, go to Start → Run → services. msc.
  2. Check whether the services Remote Procedure Call and Windows Management Instrumentation are running. If not, start those services.

What are the examples of RPC service? ›

Example Applications
  • Remote File access. Remote file and database access was one of the earliest uses of RPC. ...
  • Remote Graphics. ...
  • Remote software task management Load/Start/Control. ...
  • Other Examples.

What is RPC used for? ›

Remote Procedure Call (RPC) protocol is generally used to communicate between processes on different workstations. However, RPC works just as well for communication between different processes on the same workstation.

Is RPC a vulnerability? ›

Vulnerability Overview:

RPC is a communication method for calling and executing programs from other terminals connected to the network. CVE-2022-26809 is a remote code execution vulnerability in Microsoft RPC runtime and affects Windows.

Can you disable RPC service? ›

Limiting access to RPC services. Unfortunately, in some cases removing RPC services from the system is not an option. Some local desktop services (notably SGI's fam) are RPC based and thus need a local portmapper.

Do people still use RPC? ›

However, RPC still exists and is used when it suits the use case better. Modern implementations of RPC, such as gRPC, are now more popular. For some use cases, gRPC performs better than RPC and REST. It allows streaming client-server communications rather than the request-and-respond data exchange pattern.

What are the cons of RPC? ›

Disadvantages of RPC

RPC involves more coupling—its methods can be a leaky abstraction.

Is RPC a web service? ›

There are a few central types of web services: XML-RPC, UDDI, SOAP, and REST: XML-RPC (Remote Procedure Call) is the most basic XML protocol to exchange data between a wide variety of devices on a network. It uses HTTP to quickly and easily transfer data and communication other information from client to server.

What is RPC authentication? ›

The authentication services on the server host system provide RPC authentication. Applications use authenticated remote procedure calls to ensure that all calls come from authorized clients. They can also help ensure that all server replies come from authenticated servers.

How do I secure my remote access server? ›

Basic Security Tips for Remote Desktop
  1. Use strong passwords. ...
  2. Use Two-factor authentication. ...
  3. Update your software. ...
  4. Restrict access using firewalls. ...
  5. Enable Network Level Authentication. ...
  6. Limit users who can log in using Remote Desktop. ...
  7. Set an account lockout policy.

How do I secure my public web server? ›

Key Steps to Make Your Web Server Secure
  1. Create strong passwords.
  2. Generate an SSH key pair.
  3. Keep your server updated.
  4. Use firewalls.
  5. Consider using Linux as your web server operating system.
  6. Limit superuser/root access.
  7. Utilize VPNs and private networks.
  8. Use a multi-server environment.
Aug 15, 2024

How do I secure my public facing server? ›

We recommend that you place it on a separate, protected subnetwork. This will ensure that traffic between the Internet and the server does not traverse any part of your private internal network and that no internal network traffic is visible to the server.

How do I make my server secure? ›

So, here's a checklist to make sure your server's security is not compromised in any way.
  1. Use local firewall rules. ...
  2. Think twice before sharing any data: ...
  3. Enforce a strong password policy. ...
  4. Create individual administrative accounts: ...
  5. SQL server instances: ...
  6. Windows updates: ...
  7. Always have a backup plan: ...
  8. Code it right:

Top Articles
Washington Bar Insurance
Tsukuyomi
Bubble Guppies Who's Gonna Play The Big Bad Wolf Dailymotion
Cappacuolo Pronunciation
UPS Paketshop: Filialen & Standorte
My E Chart Elliot
Noaa Charleston Wv
Breaded Mushrooms
Coverage of the introduction of the Water (Special Measures) Bill
East Cocalico Police Department
Wells Fargo Careers Log In
Unlocking the Enigmatic Tonicamille: A Journey from Small Town to Social Media Stardom
Beds From Rent-A-Center
Owatc Canvas
Umn Biology
Jet Ski Rental Conneaut Lake Pa
Top Hat Trailer Wiring Diagram
Sports Clips Plant City
The most iconic acting lineages in cinema history
Gon Deer Forum
The Superhuman Guide to Twitter Advanced Search: 23 Hidden Ways to Use Advanced Search for Marketing and Sales
Craigslist Pet Phoenix
College Basketball Picks: NCAAB Picks Against The Spread | Pickswise
Integer Division Matlab
Lexus Credit Card Login
Chicago Based Pizza Chain Familiarly
Bend Missed Connections
Ice Dodo Unblocked 76
Helpers Needed At Once Bug Fables
Amazing Lash Bay Colony
Brenda Song Wikifeet
R3Vlimited Forum
Kaiserhrconnect
Baddies Only .Tv
Soiza Grass
Gideon Nicole Riddley Read Online Free
Telegram update adds quote formatting and new linking options
Frcp 47
Google Chrome-webbrowser
Reese Witherspoon Wiki
Pain Out Maxx Kratom
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Tinfoil Unable To Start Software 2022
Craigslist Minneapolis Com
Quaally.shop
Unblocked Games 6X Snow Rider
Union Supply Direct Wisconsin
Argus Leader Obits Today
Rubmaps H
The Ultimate Guide To 5 Movierulz. Com: Exploring The World Of Online Movies
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6162

Rating: 4.2 / 5 (53 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.