UCF STIG Viewer Logo

The rpcbind service must be configured for local only services unless organizationally defined.


Overview

Finding ID Version Rule ID IA Controls Severity
V-216294 SOL-11.1-020170 SV-216294r603267_rule Medium
Description
The portmap and rpcbind services increase the attack surface of the system and should only be used when needed. The portmap or rpcbind services are used by a variety of services using remote procedure calls (RPCs). The organization may define and document the limited use of services (for example NFS) that may use these services with approval from their Authorizing Official.
STIG Date
Solaris 11 SPARC Security Technical Implementation Guide 2022-11-18

Details

Check Text ( C-17530r370970_chk )
Check the status of the rpcbind service local_only property.
# svcprop -p config/local_only network/rpc/bind

If the state is not "true", this is a finding, unless it is required for system operations, then this is not a finding.
Fix Text (F-17528r370971_fix)
The Service Management profile is required.

If services such as portmap or rpcbind are required for system operations, the operator must document the services used and obtain approval from their Authorizing Official. They should also document the method(s) of blocking all other remote accesses through tools like a firewall or tcp_wrappers.
Otherwise, configure the rpc/bind service for local only access.

# svccfg -s network/rpc/bind setprop config/local_only=true