From Bugzilla Helper:
User-Agent: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.0.0) Gecko/20020529
Description of problem:
I`m running an NFS server.
The man pages of rpc.statd state that it is protected by tcp_wrapper.
This can not be true, as telnet`ing on it`s port works, from anywhere,
independent of the hosts.allow and hosts.deny settings.
I think the same is true for rpc.lockd and rpc.mountd.
rpc.rquotad on the other hand is protected by tcp_wrapper.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. make entry in /etc/hosts.deny (ALL: ALL or statd: ALL)
2. check with `rpcinfo -p` on which port it is running (ex. 100024 1 tcp
3. telnet host 32828
Actual Results: the host accepts a telnet connection on that port
Expected Results: the host should deny telnet on that port and create a log
entry (when using "ALL: ALL: spawn /bin/echo `date` %c %d >>
/var/log/tcpwrap.denials" in /etc/hosts.deny)
It`s a plain RH73 installation, the latest erratas installed (kernel 2.4.18-5, too).
Still no trace of libwrap in RHL 9 when doing 'ldd rpc.statd'
Forgot to add Cc
(although report is correct note that services are compiled statically against
libwrap so won't show up with ldd). Reassigning to Steve.
FYI: I'm using version 1.0.3 of nfs-utils now, I noticed a difference: mounting
would no longer work on the clients unless I add a line "mountd: 192.168." in
/etc/hosts.allow on the server.
I've built the RPM with 'rpm -ta nfs-utils-1.0.3.tar.gz'.
Red Hat apologizes that these issues have not been resolved yet. We do want to
make sure that no important bugs slip through the cracks.
Red Hat Linux 7.3 and Red Hat Linux 9 are no longer supported by Red Hat, Inc.
They are maintained by the Fedora Legacy project (http://www.fedoralegacy.org/)
for security updates only. If this is a security issue, please reassign to the
'Fedora Legacy' product in bugzilla. Please note that Legacy security update
support for these products will stop on December 31st, 2006.
If this is not a security issue, please check if this issue is still present
in a current Fedora Core release. If so, please change the product and version
to match, and check the box indicating that the requested information has been
If you are currently still running Red Hat Linux 7.3 or 9, please note that
Fedora Legacy security update support for these products will stop on December
31st, 2006. You are strongly advised to upgrade to a current Fedora Core release
or Red Hat Enterprise Linux or comparable. Some information on which option may
be right for you is available at http://www.redhat.com/rhel/migrate/redhatlinux/.
Any bug still open against Red Hat Linux 7.3 or 9 at the end of 2006 will be
closed 'CANTFIX'. Again, if this bug still exists in a current release, or is a
security issue, please change the product as necessary. We thank you for your
help, and apologize again that we haven't handled these issues to this point.
Red Hat Linux is no longer supported by Red Hat, Inc. If you are still
running Red Hat Linux, you are strongly advised to upgrade to a
current Fedora Core release or Red Hat Enterprise Linux or comparable.
Some information on which option may be right for you is available at
Closing as CANTFIX.