How to disable Service Location Protocol (SLP) on RHEL

Solution In Progress - Updated -

Issue

  • The Service Location Protocol (SLP) is vulnerable to an attack through UDP.
  • The OpenSLP provides a dynamic configuration mechanism for applications in local area networks, such as printers and file servers. However, SLP is vulnerable to a reflective denial of service amplification attack through UDP on systems connected to the internet. SLP allows an unauthenticated attacker to register new services without limits set by the SLP implementation. By using UDP and spoofing the source address, an attacker can request the service list, creating a Denial of Service on the spoofed address.
  • How to disable SLP service in RHEL.

Environment

  • Red Hat Enterprise Linux (RHEL) 7, 9
  • openslp-server

Subscriber exclusive content

A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.

Current Customers and Partners

Log in for full access

Log In

New to Red Hat?

Learn more about Red Hat subscriptions

Using a Red Hat product through a public cloud?

How to access this content