Fact-checked by Grok 2 weeks ago

Portmap

Portmap is a in the Open Network Computing (ONC) (RPC) protocol that dynamically maps RPC program numbers and versions to specific port numbers on a host, allowing clients to locate and bind to remote services without predefined static ports. Developed by in the as part of the ONC RPC framework, portmap facilitates communication for distributed applications like the Network File System (NFS) by running on a fixed port (/ port 111) and providing procedures for service registration, unregistration, port queries, and remote procedure invocation. Its core operations, defined in version 2 of the RPC protocol (program number 100000), include PMAPPROC_SET for registering a with a , PMAPPROC_UNSET for deregistration, PMAPPROC_GETPORT for retrieving a number given a program and version, PMAPPROC_DUMP for listing all current mappings, and PMAPPROC_CALLIT for relaying calls to local services via broadcast. Portmap enables dynamic binding in RPC-based systems, where servers notify it upon startup with their program details, and clients query it to obtain the correct transport-specific (e.g., or ) for communication. While essential for NFS versions 2 and 3 and other legacy RPC services, portmap has known security vulnerabilities due to its weak mechanisms, making it susceptible to in untrusted networks, such as denial-of-service attacks or unauthorized access. In modern systems, including and various distributions, portmap has been largely superseded by the more secure rpcbind daemon, which adds support for multiple transport protocols and improved access controls while maintaining .

Introduction

Definition and Purpose

Portmap is a daemon within the Open Network Computing (ONC) (RPC) framework that functions as a registry service, mapping unique RPC program numbers—along with their versions and protocols—to dynamically assigned or port numbers on a host machine. This mapping allows RPC services to operate without fixed port assignments, as servers register their ephemeral ports upon startup, storing the associations in an internal table maintained by the portmap process. The primary purpose of portmap is to enable clients to discover and connect to RPC services dynamically, without requiring prior knowledge of the specific port numbers used by those services, which supports scalable environments where multiple services may run concurrently on the same host. By querying portmap with a consisting of the RPC program number, version, and protocol (such as or ), clients receive the corresponding port, facilitating seamless remote procedure invocations across networks. This mechanism contrasts with statically assigned ports for well-known services, as portmap promotes flexibility by allowing RPC servers to bind to available high-numbered ports while centralizing discovery through a single, standardized interface. Portmap itself operates on the well-known port 111 for both and transports, making it accessible to clients for registration and lookup requests without needing additional configuration. This fixed port assignment ensures that portmap serves as a reliable entry point in the ONC RPC ecosystem, decoupling service port selection from client-side hardcoded values and enhancing overall system portability.

Role in ONC RPC

In the ONC RPC architecture, portmap serves as the essential initial contact point for client-server interactions, allowing clients to dynamically discover the network on which a remote service is listening before initiating RPC calls. This integration enables seamless communication in distributed systems by abstracting the binding of RPC services to specific ports, which would otherwise require static configuration. Portmap operates as an RPC service itself, identified by program number 100000, version 2, and bound to the well-known 111 over or . By handling these lookups, portmap facilitates the core RPC mechanism of invoking remote procedures as if they were local, supporting the protocol's extensibility across heterogeneous networks. The typical workflow begins when an RPC server starts and registers its with portmap by providing the RPC program number, version number, protocol ( or ), and the port it is using. A client, seeking to access a remote , first sends a query to portmap on port 111, specifying the target program's number, version, and preferred protocol. If the mapping exists, portmap responds with the corresponding port number, enabling the client to direct subsequent RPC requests to that endpoint; otherwise, it returns an indication of no mapping. This query-response exchange ensures that RPC calls can proceed without prior knowledge of dynamic port assignments, which are common in environments where services may restart or scale. Portmap's design promotes transport independence within ONC RPC by decoupling service identification—via program and version numbers—from fixed port assignments, allowing the same RPC program to operate over different protocols without altering client code. This decoupling is particularly valuable for widely used services such as (NFS, program number 100003) and (NIS, program number 100004), which rely on portmap to enable cross-network access to file sharing and directory services, respectively. Overall, portmap underpins the protocol's ability to support modular, location-transparent remote procedure calls in systems and beyond.

History and Development

Origins at

Portmap was developed by in the early 1980s as a key component of the Open Network Computing (ONC) (RPC) suite, aimed at standardizing remote procedure calls for Unix-based distributed systems. This daemon addressed the challenges of by mapping RPC program numbers and versions to specific numbers, enabling clients to locate and invoke remote services without fixed port assignments. Initially created to support Sun's internal networking technologies, portmap facilitated seamless integration across heterogeneous Unix environments, laying the groundwork for broader adoption in . Introduced in 1985 in 2.0 alongside the initial deployment of the Network File System (NFS), portmap was first deployed for services like NFS, where dynamic service registration became essential for over networks. The original implementation operated as a lightweight -based daemon listening on port 111, providing a simple registry for RPC servers to announce their presence and allowing clients to query for service locations via (UDP) or (). This design emphasized efficiency in early client-server architectures, where resources were limited and static port configurations risked conflicts in multi-service setups. The motivation behind portmap stemmed from the need for flexible in distributed systems, where traditional well-known ports were insufficient for the growing number of RPC-based applications. By enabling dynamic binding, Sun engineers avoided port exhaustion and conflicts, allowing servers to bind to arbitrary high-numbered ports while maintaining discoverability through a centralized mapper. Version 2 of the portmap protocol emerged as the , supporting both and transports and becoming integral to ONC RPC's portability across Unix variants. This approach not only streamlined NFS operations but also influenced subsequent RPC implementations by prioritizing simplicity and interoperability in networked environments.

Transition to rpcbind

By the late and into the , the inherent limitations of portmap, particularly its lack of restrictions on remote registrations and to unauthorized mappings, prompted the of rpcbind as a backward-compatible yet enhanced replacement. Portmap's design allowed any remote host to perform SET and UNSET operations without , enabling potential for denial-of-service or unauthorized injection, which became increasingly problematic as networked systems proliferated. Rpcbind versions 3 and 4 addressed these issues by introducing transport-independent binding protocols, supporting a wider range of network transports beyond just and , and incorporating features like restricted local-only access for registration operations by default. Rpcbind first appeared in 2.0, released by in , marking a significant upgrade in the ONC RPC ecosystem with added support for TCP-based queries and basic mechanisms to mitigate remote access risks. This implementation standardized many of the enhancements later formalized in RFC 1833 (1995), which defined rpcbind's protocol procedures, including version 3's core mapping functions and version 4's advanced capabilities such as indirect binding—allowing services to register via hostnames rather than direct —and version-specific address retrieval to limit exposure of outdated or vulnerable service versions. These features collectively aimed to prevent unauthorized mappings by enforcing stricter controls on how clients discover and interact with RPC services, reducing the in increasingly internet-connected environments. The transition from portmap to rpcbind accelerated in Unix-like systems during the 2000s, driven by growing awareness of internet exposure risks where exposed portmap services could facilitate reconnaissance and amplification attacks on RPC-dependent protocols like NFS. Many Linux distributions, such as Arch Linux in 2009, phased out portmap entirely in favor of rpcbind, which maintained a compatibility mode to emulate portmap version 2 behavior while enforcing the new security defaults. Similarly, distributions like Debian and Red Hat followed suit around the same period, updating package managers and init scripts to prioritize rpcbind for its improved resilience against remote exploitation, including the default restriction of SET and UNSET calls to localhost interfaces unless explicitly enabled in insecure mode. This shift ensured continued interoperability for legacy applications while aligning with evolving best practices for securing networked file systems and remote procedure calls.

Protocol and Operation

Portmap Protocol Procedures

The Portmap protocol, as defined in RFC 1057, operates using (RPC) calls encoded with (XDR) and transmitted over or on port 111. This version 2 protocol facilitates the registration and lookup of service ports by RPC programs, enabling clients to discover the network addresses of remote services without prior knowledge of their ports. All interactions adhere to the ONC RPC framework, with Portmap itself listening on the well-known port 111 to handle incoming requests from clients and servers. Portmap defines five procedures, each identified by a procedure number and utilizing a common for inputs and outputs. The pmap_port_by_number encapsulates the key elements: an unsigned for the RPC program number, an unsigned for the version number, an unsigned for the protocol (typically 17 for or 6 for ), and an unsigned for the number. These procedures allow for testing , managing mappings, and retrieving .
  • PMAPPROC_NULL (0): This procedure performs no operation and serves solely to verify connectivity with the Portmap server, returning a void response to confirm the service is operational.
  • PMAPPROC_SET (1): Servers invoke this to register a new mapping by providing the number, , , and ; it returns a value indicating success (true if the mapping is successfully added (no prior mapping for the existed), false otherwise (e.g., if a mapping already exists)).
  • PMAPPROC_UNSET (2): This removes all mappings for the provided number and , ignoring the protocol and fields, returning a to indicate whether the unregistration succeeded (true if mappings were present and removed, false if not found).
  • PMAPPROC_GETPORT (3): Clients use this to query the associated with a given , , and ; it returns the number as an unsigned integer if the mapping exists, or 0 if no such mapping is registered.
  • PMAPPROC_DUMP (4): This procedure retrieves all currently registered mappings, returning a list of pmap_port_by_number structures containing every active --- triplet maintained by the server.
  • PMAPPROC_CALLIT (5): This procedure enables a client to call a remote procedure via the portmapper without knowing the , taking number, , procedure number, and XDR-encoded arguments; it forwards the call over (returning results if successful, silent on failure) and is useful for broadcasts, returning the and call results.
These procedures form the core of Portmap's functionality, ensuring efficient and standardized handling of in distributed systems.

Mapping and Query Process

When an RPC server process initializes on a host, it first binds to a dynamically assigned , typically from the ephemeral range above , to listen for incoming requests. The server then contacts the local portmap daemon, which listens on or port 111, by invoking the PMAPPROC_SET procedure. This procedure provides the tuple consisting of the RPC program number, version number, transport protocol (such as or ), and the bound number. If no prior mapping exists for that specific (program, version, protocol) combination, portmap establishes the association in its internal records and returns a TRUE to confirm success; otherwise, it returns FALSE, refusing to overwrite an existing mapping to prevent conflicts. For client-side discovery, an RPC client seeking to invoke a remote service first connects to the target's portmap daemon on port 111 using the , supplying the desired program number, version number, and . Portmap consults its internal mappings and responds with the corresponding port number if a match is found; the client then establishes a direct connection to that port for subsequent RPC calls, bypassing portmap for the actual invocations. This process enables dynamic binding without requiring clients to know service ports in advance. Portmap supports multiple versions of the same RPC by treating each (, , ) tuple as a in its mappings, allowing coexistence of different versions on potentially distinct ports. In cases of error, such as an unmapped service, PMAPPROC_GETPORT returns 0, signaling the client that the requested or is unavailable on the host. Internally, portmap maintains a table of these mappings, often implemented as a or keyed by the (program, version, ) for efficient lookups and insertions. Updates to this structure, such as during registration via PMAPPROC_SET, are performed atomically using mechanisms like locks to prevent race conditions in concurrent access scenarios.

Implementation Details

Daemon Functionality

The portmap daemon is typically invoked as /usr/sbin/portmap or rpc.portmap during system initialization, prior to starting any RPC servers. Upon startup, it binds to and port 111 to listen for incoming requests and forks into the background as a daemon process if not already running in that mode. During runtime, the daemon maintains an in-memory table of RPC program numbers, versions, and associated port numbers, with no persistent storage across restarts. It handles incoming RPC requests using the ONC RPC library, processing procedures such as registration (PMAPPROC_SET), unregistration (PMAPPROC_UNSET), and queries (PMAPPROC_GETPORT) to manage the mapping of services to dynamic ports. This in-memory mapping supports up to thousands of entries, limited by resources and . The daemon exhibits a minimal resource footprint. In its version 2 implementation, portmap lacks built-in , permitting any remote host to perform set or unset operations on mappings without .

System Integration and Configuration

In modern operating systems, particularly distributions, portmap functionality is provided by the rpcbind daemon, which is installed via the system's as part of the rpcbind package or bundled with nfs-utils for NFS support. For example, on and derivatives like , administrators install it using yum install rpcbind or dnf install rpcbind, while on Debian-based systems like , it is available via apt install rpcbind. This package ensures with the original portmap protocol (version 2) without requiring a separate installation, as rpcbind natively supports RPC versions 2, 3, and 4. In contrast, older systems such as treated portmap as a standalone daemon included in the base operating system installation, typically started automatically during boot without additional package management. Configuration of rpcbind for portmap compatibility is minimal and primarily involves command-line options passed during startup, with no extensive configuration files required. Common options include -d to enable debug mode for verbose to aid , and -l to activate of connections through wrappers for monitoring. In , rpcbind is typically started and managed via using the rpcbind.service unit , which can be enabled with systemctl enable rpcbind and started with systemctl start rpcbind; additional options like -w for warm-start mode (re-reading its state ) can be specified in the service override at /etc/systemd/system/rpcbind.service.d/override.conf. To disable the service, use systemctl stop rpcbind and systemctl disable rpcbind. In non-systemd environments, such as older -based systems, it is launched via /etc/init.d/rpcbind start scripts. Integration of rpcbind into the system is essential for services relying on ONC RPC, such as NFS (versions 2 and 3) and , where it must run before these daemons to handle port mapping. Administrators must configure rules to permit inbound and outbound traffic on and port 111, for instance, using firewall-cmd --permanent --add-port=111/tcp --add-port=111/udp on firewalld-based systems or equivalent rules like -A INPUT -p udp --dport 111 -j ACCEPT. rpcbind supports both IPv4 and natively, binding to all interfaces by default, but can be restricted to specific addresses (e.g., only) using the -h option, such as rpcbind -h 127.0.0.1, which is ignored under socket activation and instead configured via socket unit files like ListenStream=111 in /usr/lib/systemd/system/rpcbind.socket. This ensures seamless operation in mixed-network environments while minimizing exposure.

Security Considerations

Vulnerabilities in Portmap

Portmap, particularly in its version 2 implementation, lacks built-in authentication mechanisms, enabling remote attackers to manipulate service mappings without verification. The PMAPPROC_SET procedure allows any remote client to register or overwrite RPC program mappings by specifying a program number, version, protocol, and port, potentially hijacking legitimate services and redirecting client requests to malicious endpoints. This absence of authentication is inherent to the protocol as defined in the original ONC RPC specification, where no credentials or access controls are enforced for mapping operations. Denial-of-service attacks exploit portmap's reliance on UDP port 111, where attackers can flood the service with bogus queries or repeated PMAPPROC_DUMP requests, exhausting server resources such as CPU and memory. Additionally, portmap supports UDP-based amplification, in which spoofed requests with a victim's prompt the server to send amplified responses—up to 28 times the original packet size—overwhelming the target with reflected traffic. These vulnerabilities stem from the protocol's stateless design and lack of or validation. The PMAPPROC_DUMP procedure further exposes internal network details by returning a complete list of all registered RPC services, including program numbers, versions, protocols, and ports, without requiring . When portmap is exposed to the , this enables attackers to enumerate available services for targeted exploitation, such as identifying vulnerable NFS or implementations. Historically, portmap's unsecured nature has been recognized since the , with advisories highlighting its risks for internet-facing systems; for instance, CVE-1999-0632 notes that the RPC portmapper operates as an unsecured protocol prone to unauthorized access and should be restricted to trusted networks or disabled entirely. These persistent issues contributed to the of version 2 in favor of rpcbind, which introduces improved features like host-based access controls.

Mitigation and Best Practices

To mitigate risks associated with portmap deployments, implementing firewall rules is essential to restrict access to port 111, which handles both TCP and UDP traffic for RPC service discovery. Administrators should configure iptables or equivalent tools like ufw to allow connections only from trusted IP addresses or subnets, such as localhost (127.0.0.1) and specific internal networks (e.g., 192.168.0.0/24), while dropping all other inbound traffic. For example, the following iptables rules can be applied: iptables -A INPUT -p tcp -s ! 192.168.0.0/24 --dport 111 -j DROP to block non-trusted TCP sources, iptables -A INPUT -p tcp -s 127.0.0.1 --dport 111 -j ACCEPT to permit localhost TCP, and similar rules for UDP (iptables -A INPUT -p udp -s ! 192.168.0.0/24 --dport 111 -j DROP). These measures prevent unauthorized queries that could expose service mappings or facilitate attacks. Transitioning from the legacy portmap daemon to rpcbind provides enhanced features, including support for s 3 and 4, which incorporate better access controls and allow TCP-only queries to avoid vulnerabilities. Rpcbind 3 and 4 implement indirect binding and restrict certain operations like SET and UNSET to local (same-machine) calls via source address verification, unlike the unrestricted 2 used by portmap. To configure rpcbind securely, enable these higher s via (e.g., in /etc/netconfig or options) and restrict SET/UNSET operations to by default, avoiding the -i (insecure) flag. Additionally, integrate TCP wrappers by editing /etc/hosts.allow to permit only trusted hosts (e.g., rpcbind: 192.168.0.0/24) and deny all others in /etc/hosts.deny (e.g., rpcbind: ALL), leveraging IP-based restrictions to mitigate DNS-related risks. For NFSv4 environments, rpcbind can often be disabled entirely, as it no longer requires the for mounting. Effective monitoring of portmap or rpcbind activity helps detect anomalous behavior and ensure proper service registration. Enable logging through syslog by configuring the daemon to output events (e.g., via /etc/rsyslog.conf for RPC-related logs), capturing connection attempts and mapping changes. Regularly audit mappings using the rpcinfo tool, such as rpcinfo -p to list all registered RPC services, their ports, versions, and protocols (e.g., confirming NFS at program 100003, versions 2-3 on port 2049 via TCP/UDP). If services appear unregistered or unexpected, restart the daemon to re-register them. Disable portmap or rpcbind if RPC services like NFS are not in use, particularly for local-only operations, by stopping the service (e.g., systemctl disable --now rpcbind) and confirming port 111 closure with tools like netstat or ss. As a , operate rpcbind with minimal privileges by ensuring it drops root privileges after binding to port 111, as implemented in standard distributions, and apply regular updates to underlying libraries like libtirpc to address known vulnerabilities such as denial-of-service issues from malformed packets. For instance, update to libtirpc version 1.3.3 or later to fix resource exhaustion flaws. In high- environments, consider binding rpcbind to specific interfaces using the -h option (e.g., rpcbind -h 127.0.0.1) to limit exposure to only.

Examples and Usage

Command-Line Interactions

The primary command-line tool for interacting with a portmap instance is rpcinfo, which queries the portmapper (or rpcbind in modern implementations) to report registered RPC services and their associated ports. The rpcinfo -p [host] option probes the portmapper on the specified host (defaulting to if omitted) and displays a list of all registered RPC programs, including each program's number, version, protocol ( or ), and port number. For example, running rpcinfo -p localhost might produce output like:
   program vers proto   port    service
    100000    4   tcp    111  portmapper
    100000    3   tcp    111  portmapper
    100000    2   tcp    111  portmapper
    100000    4   udp    111  portmapper
    100000    3   udp    111  portmapper
    100024    1   udp  32769  status
    100024    1   tcp  32769  status
    100021    1   udp  33447  nlockmgr
    100021    3   udp  33447  nlockmgr
    100021    4   udp  33447  nlockmgr
    100021    1   tcp  32803  nlockmgr
    100021    3   tcp  32803  nlockmgr
    100021    4   tcp  32803  nlockmgr
This format allows users to verify active mappings, with the first column showing the RPC program number, the second the version, the third the protocol, and the fourth the dynamic port. To query protocol-specific mappings, the -T udp or -T tcp option can be used alongside -p, filtering results to UDP or TCP transports, respectively. In a typical registration scenario, an RPC server registers its service with the portmapper using the pmap_set library function or equivalent, after which it can verify the registration locally via rpcinfo -p localhost. For instance, after an NFS server starts and registers, rpcinfo -p localhost will list the NFS program (number 100003) alongside its version (typically 2, 3, or 4), protocol, and assigned port, confirming successful binding. Clients similarly use rpcinfo -p [host] to discover service ports before initiating connections; for NFS access, a client might run rpcinfo -p nfs-server | grep '^100003' to locate the NFS port (e.g., 2049 for version 4, though earlier versions use dynamic ports via portmap). In legacy Linux systems with the portmap package, testing registrations without a full server implementation is possible using the pmap_set utility to restore mappings from an ASCII file generated by pmap_dump, followed by verification with rpcinfo. Additional tools leverage portmap indirectly for NFS-related interactions. The showmount -e [host] command queries the remote host's mount daemon (mountd, RPC program 100005) to list exported NFS filesystems, relying on portmap to resolve the mountd port dynamically. For example:
Export list for nfs-server:
    /export/home 192.168.1.0/24
    /export/data *
This output displays available shares and their export policies, but requires a functioning portmap on the server to succeed. For comprehensive mapping dumps, the pmap_dump utility (part of the portmap package) enumerates all portmapper entries and saves them to an ASCII file, providing a of the current registrations in a format similar to rpcinfo -p output but suitable for scripting or backup.

Real-World Deployment Scenarios

In Network File System (NFS) deployments, portmap plays a crucial role by mapping RPC program numbers to dynamic ports for key NFS services, enabling clients to locate and access shared resources. Specifically, portmap registers the NFS daemon (nfsd, program number 100003) and the mount daemon (mountd, program number 100005), which handle file access and mount requests, respectively. For instance, an NFS client querying a server to mount the /export directory first contacts portmap on port 111 to obtain the mountd port, then uses that information to perform the mount operation via RPC, ensuring seamless integration in distributed environments. In legacy Unix clusters, such as those running older versions of or AIX, portmap facilitates dynamic for components like automount and the Yellow Pages binder (ypbind). On these systems, portmap converts RPC program numbers to port numbers, allowing automount to automatically mount NFS shares without static configuration and ypbind to bind to servers for user and host information. This setup was standard in pre-rpcbind eras, supporting cluster-wide resource sharing in enterprise environments reliant on ONC RPC protocols. For transitional scenarios in mixed environments, modern systems like servers can run rpcbind in to emulate the original portmap protocol (version 2), ensuring with Sun clients that expect portmap behavior. This approach allows Linux-based NFS or services to serve older clients without requiring full protocol upgrades, bridging generational differences in RPC implementations. Portmap is used in some embedded systems running lightweight distributions in resource-constrained setups, often alongside tools like for minimal RPC-based services such as NFS. It is also deployed in air-gapped networks, isolated from external connectivity, and is typically avoided in exposed environments like infrastructures or DMZs due to its design for trusted internal use.

References

  1. [1]
    RFC 1057 - RPC: Remote Procedure Call Protocol specification
    This document specifies version two of the message protocol used in Sun's Remote Procedure Call (RPC) package.Missing: history | Show results with:history
  2. [2]
    portmap Utility - ONC+ RPC Developer's Guide - Oracle Help Center
    Portmap is a system registration service that maps RPC program and version numbers to transport-specific port numbers, enabling dynamic binding of remote ...
  3. [3]
    21.9. NFS and portmap | Deployment Guide | Red Hat Enterprise Linux
    The portmap service redirects the client to the proper port number so it can communicate with the requested service. Because RPC-based services rely on portmap ...
  4. [4]
    RFC 1833: Binding Protocols for ONC RPC Version 2
    This document describes the binding protocols used in conjunction with the ONC Remote Procedure Call (ONC RPC Version 2) protocols.
  5. [5]
    portmap Operation - ONC+ RPC Developer's Guide
    portmap currently supports two protocols (UDP/IP and TCP/IP). portmap is contacted by talking to it on assigned port number 111 on either of these protocols.
  6. [6]
    Remote Procedure Call (RPC) Program Numbers
    Apr 6, 2009 · RPC Program Numbers ; Unassigned, 1-99999 ; portmapper, 100000, pmapprog portmap rpcbind ; remote stats, 100001, rstatprog ; remote users, 100002 ...
  7. [7]
    RFC 5531 - RPC: Remote Procedure Call Protocol Specification ...
    This document describes the Open Network Computing (ONC) Remote Procedure Call (RPC) version 2 protocol as it is currently deployed and accepted.
  8. [8]
    RPC Port Mapper Program - IBM
    The port mapper protocol defines a network service that permits clients to look up the port number of any remote program supported by the server.Missing: definition | Show results with:definition
  9. [9]
    RFC 1833 - Binding Protocols for ONC RPC Version 2
    This document describes the binding protocols used in conjunction with the ONC Remote Procedure Call (ONC RPC Version 2) protocols.
  10. [10]
    RFC 1833 - Binding Protocols for ONC RPC Version 2
    Mar 2, 2013 · This document describes the binding protocols used in conjunction with the ONC Remote Procedure Call (ONC RPC Version 2) protocols.
  11. [11]
    rpcbind(8) - Linux manual page - man7.org
    -i “Insecure” mode. Allow calls to SET and UNSET from any host. Normally rpcbind accepts these requests only from the loopback interface for security reasons.Missing: indirect negotiation
  12. [12]
    A New DDoS Reflection Attack: Portmapper - Lumen Blog
    Aug 28, 2015 · Portmapper is a mechanism for RPC services to register for internet calls, used in DDoS reflection attacks, and is a new vector for ...Missing: definition | Show results with:definition
  13. [13]
    portmap replaced by rpcbind & important nfs-utils upgrade - Arch Linux
    Jun 23, 2009 · This is a rather important upgrade, you are going to have to change config files. /etc/rc.conf daemons changes: Change portmap to rpcbind ...Missing: distributions 2000s
  14. [14]
    Re: Apparent portmap to rpcbind transition? - Debian Mailing Lists
    Jan 20, 2010 · Since a number of packages > currently rely on portmap (list based on rdepends below) this is likely > to require a transition of some kind. > I ...Missing: history | Show results with:history
  15. [15]
    RFC 1833: Binding Protocols for ONC RPC Version 2
    ### Summary of PMAPPROC_SET from RFC 1833, Section 3.1
  16. [16]
    RFC 1833: Binding Protocols for ONC RPC Version 2
    ### Summary of PMAPPROC_GETPORT from RFC 1833, Section 3.2
  17. [17]
    portmap Protocol (ONC+ Developer's Guide)
    The portmap program maps RPC program and version numbers to transport-specific port numbers. This program makes dynamic binding of remote programs possible.
  18. [18]
  19. [19]
    portmap Daemon - IBM
    The portmap daemon converts RPC program numbers into Internet port numbers. When an RPC server starts up, it registers with the portmap daemon.Missing: functionality documentation
  20. [20]
    portmap(8) - Linux man page - Die.net
    Portmap is a server that converts RPC program numbers into DARPA protocol port numbers. It must be running in order to make RPC calls.
  21. [21]
    portmap Protocol
    The portmap program maps RPC program and version numbers to transport-specific port numbers. This program makes dynamic binding of remote programs possible.
  22. [22]
    [PDF] Small Memory mini-HOWTO - The Linux Documentation Project
    The portmap daemon is used to handle RPC services. If you do not run an NFS server or any other RPC programs you can remove portmap. 4.5. sendmail.
  23. [23]
    2.2.2. Securing Portmap | Security Guide | Red Hat Enterprise Linux | 6
    Portmap has weak authentication; use TCP Wrappers to limit access to networks/hosts, and use only IP addresses, not hostnames, for security.
  24. [24]
    8.8. NFS and rpcbind | Red Hat Enterprise Linux | 7
    The rpcbind utility maps RPC services to the ports on which they listen. RPC processes notify rpcbind when they start, registering the ports they are listening ...<|control11|><|separator|>
  25. [25]
    rpcbind-1.2.8 - Linux From Scratch!
    The rpcbind program is a replacement for portmap. It is required for import or export of Network File System (NFS) shared directories.
  26. [26]
    rpcbind(8) - Linux manual page - man7.org
    The rpcbind utility is a server that converts RPC program numbers into universal addresses. It must be running on the host to be able to make RPC calls on a ...Missing: distros | Show results with:distros
  27. [27]
    [PDF] Restricting Network Access to System Daemons Under SunOS
    The secure library can be installed and used on any stock Sun system provided these simple requirements are met: SunOS version 4.1, 4.1.1, or 4.1.2 and ...
  28. [28]
    rpcbind(1M)
    -C Turn on compatibility mode. This will allow local applications to ... It is supplied to provide command line compatibility with portmap. -l backlog ...
  29. [29]
    Debian Jessie start rpcbind and nfs-common at boot with systemd
    Feb 15, 2016 · I want to know the best way to start those 3 services (rpcbind, nfs-commond, autofs) in the correct order to avoid issues.systemd - How stop rpcbind from being started on Arch Linux?Fedora 25 and disabling whatever is listening on port 111More results from unix.stackexchange.com
  30. [30]
    Chapter 9. Securing network services | Red Hat Enterprise Linux | 8
    You can secure rpcbind by restricting access to all networks and defining specific exceptions using firewall rules on the server.
  31. [31]
    rpc - rpcbind - is there really no way to make the tcp ports bind to a ...
    Sep 12, 2012 · The rpcbind is required to map RPC service to network ( read TCP or UDP ) address and port. NFS versions 2 and 3 require an additional service mountd.NFS client firewall settings and rpcbind - Server FaultNFS Client Issue on CentOS 6: rpcbind not listening on port 111More results from serverfault.com
  32. [32]
    UDP-Based Amplification Attacks - CISA
    Dec 18, 2019 · Attackers are leveraging the behavior of the portmap service through spoofed requests to flood a victim's network with UDP traffic. ... UDP port ...Missing: 111 | Show results with:111
  33. [33]
    CVE-1999-0632 Detail - NVD
    The RPC portmapper service is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.
  34. [34]
    2.2.2.2. Protect portmap With iptables - Red Hat Documentation
    To further restrict access to the portmap service, it is a good idea to add iptables rules to the server and restrict access to specific networks. Below are two ...Missing: best practices
  35. [35]
    4.3. Securing Services | Security Guide | Red Hat Enterprise Linux | 7
    The rpcbind service is a dynamic port assignment daemon for RPC services such as NIS and NFS. It has weak authentication mechanisms and has the ability to ...<|control11|><|separator|>
  36. [36]
    Security update for libtirpc SUSE-SU-2022:3305-1
    Description: This update for libtirpc fixes the following issues: CVE-2021-46828: Fixed denial of service vulnerability with lots of connections (bsc#1201680).Missing: best practices
  37. [37]
    rpcinfo(8) - Linux manual page - man7.org
    rpcinfo makes an RPC call to an RPC server and reports what it finds. In the first synopsis, rpcinfo lists all the registered RPC services with rpcbind on host.
  38. [38]
    pmap_set(3) - Linux man page - Die.net
    A user interface to the portmap service, which returns a list of the current RPC program-to-port mappings on the host located at IP address *addr. This routine ...
  39. [39]
    rpc(5): RPC program number data base - Linux man page - Die.net
    The rpc file contains user readable names that can be used in place of RPC program numbers. Each line has the following information.
  40. [40]
    redhat pmap_set man page on unix.com
    The pmap_set command can be used to restart a running portmapper or to set the list of registered RPC programs on the local host.
  41. [41]
    showmount(8): mount info for NFS server - Linux man page - Die.net
    showmount queries the mount daemon on a remote host for information about the state of the NFS server on that machine.
  42. [42]
    portmap-5 - Linux From Scratch!
    portmap is the rpc port mapper. pmap_dump. pmap_dump saves the port mapping table to an ascii file. pmap_set. pmap_set restores the port mapping table from ...
  43. [43]
    rpc File for NFS - IBM
    The /etc/rpc file, part the Network Support Facilities, contains names that are used in place of RPC program numbers. These names can be read by users.
  44. [44]
    3. Setting Up an NFS Server
    NFS depends on the portmapper daemon, either called portmap or rpc.portmap. It will need to be started first. It should be located in /sbin but is sometimes in ...Missing: integration | Show results with:integration
  45. [45]
    ypbind(8): NIS binding process - Linux man page - Die.net
    If NetworkManager establishes a connection, ypbind will reread all configuration files, registers at the local portmapper and try to search NIS servers. If ...
  46. [46]
    The Swiss Army Knife of Embedded Linux - BusyBox
    BusyBox provides a fairly complete POSIX environment for any small or embedded system. BusyBox is extremely configurable. This allows you to include only the ...Commands · Command Descriptions · Libc Nss