Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
If you nmap your computer from your computer, you don't necessarily see correct results; in general, you see the services that are available locally to your machine. To check the connections available from outside, you need to run nmap from outside.
It is generally safe to have ssh/22 open. This is the most popular way to connect to your machine remotedly.
If there is a rpcbind running in that port, I would keep that closed, as well as unknown services, unless you have good reason not to.
Also Regardless of most services that you have running on your system
Anyone will still be able to telnet into your services, this merely means that the service is active. For most of the time if your service is available local chances are its available global too. Unless you have manually set it up to be available locally only or its firewalled off.
But all in all disable 111, and 1030
you can try these commands they may give you a better understanding of the processes:
Use chkconfig to get an idea of what services and daemons are started at boot as well as to toggle them on/off. Use the service command to turn currently running serivces/daemons on or off. So:
To see what starts at boot:
chkconfig --list
That should give you a list of all the applications and whether they're on or off at a given runlevel. To just see what is turned on:
chkconfig --list | grep on
To then turn an application off at boot:
chkconfig <service_name> off
To stop a currently running daemon use:
service <service_name> stop
So to shutoff rpcbind (aka portmap), do:
chkconfig portmap off
service portmap stop
on your menu in fedora go to system settings, server settings, services
there you have a list of each thing that is loading on your computer find rpc and just uncheck it and file save and reboot.
or run ntsysv as root and just uncheck what ever you dont want and hit ok
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.