Hide Forgot
To avoid port conflicts with services such as CUPS or IMAP quota should be using portreserve for reserving respective ports within range 600 - 1023. According to /etc/services quota might be using port(s) withing this range. Typical changes required: Given a SysV service package that uses a particular port, (say, krb5_prop/tcp - 754): 1) Create a file named after the service, for example 'krb5_prop', which contains: krb5_prop/tcp 2) In the spec, install this file in /etc/portreserve, i.e., /etc/portreserve/krb5_prop 3) In the spec, add 'Requires: portreserve' to the package that provides the server. 4) In the init script, in the start() stanza, add: [ -x /sbin/portrelease ] && /sbin/portrelease krb5_prop &>/dev/null || : before starting the daemon. Some background can be found in bug 103401.
quota_nld executable is an RPC service. I think the portreserve hack is intended for non-RPC services. So I think this request is not applicable to quota package.
You are right that portreserve hack is intended for non-RPC services - as RPC services usually use dynamic (and random between 600-1023) port. This is the default case even for quota_nld, so if you think that using portreserve for port 875 is not a good idea, feel free to close this report. I'm not really sure, how this will work for service opened via portmap, even if this will be on static port in reserved area.
Yes, default quota_nld configuration is to select random port through rpcbind. So adding portreserve has no sense.