Why is Red Hat Gluster Storage using RPC ports in the privileged range? Are these ports compromised?

Solution Verified - Updated -

Issue

  • How can I determine what these RPC ports are being used for and if the ports are legitimately being used?
  • My security scan is detecting RPC ports in the privileged ports range on my Red Hat Storage Server, why?
#Q4-2014 11/15/2014 1/6/2015 192.168.96.11 foobar.example.com Linux 2.6 66044 5.0 NFS RPC Services Listening on Non-Privileged Ports 0 unknown When running for the first time on a server, RPC Daemons register an entry in the portmapper list. Since they usually run as root, RPC services use ports below 1024 (privileged ports), excluding the NFS and nlockmgr RPC services that listen on ports 2049 and 4045 respectively. It was discovered that such services were not running on their assigned port. Run NFS and nlockmgr RPC services on their assigned ports. By exploiting RPC services running on non-reserved ports, unauthorized users can perform port hijacking. TCP Port 636 #UDP Port 634 RPC

Environment

  • Red Hat Gluster Storage

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase of over 48,000 articles and solutions.

Current Customers and Partners

Log in for full access

Log In