Adds rpc-statd-notify.service
disabling to Proxmox hardening guide
This commit is contained in:
@ -1,6 +1,7 @@
|
||||
---
|
||||
title: "Hardening Proxmox, some in one place"
|
||||
date: 2019-01-11
|
||||
last_modified_at: 2024-12-21 17:17
|
||||
url: hardening-proxmox-some-in-one-place
|
||||
layout: post
|
||||
category: Security
|
||||
@ -59,10 +60,10 @@ NEED_STATD=no
|
||||
You can also disable **RPC** services :
|
||||
|
||||
{% highlight bash %}
|
||||
systemctl disable --now rpcbind.service rpcbind.socket
|
||||
systemctl disable --now rpcbind.service rpcbind.socket rpc-statd-notify.service
|
||||
{% endhighlight %}
|
||||
|
||||
You only have to `reboot` now, and you will be able to verify the sockets that are listening with `ss -atlnup` :wink:
|
||||
You only have to `reboot` now, and you will be able to verify the sockets that are listening with `ss -atlnup` :wink:
|
||||
|
||||
#### IPv6 sockets
|
||||
|
||||
@ -92,7 +93,7 @@ systemctl restart ssh.service
|
||||
|
||||
#### PVEProxy TLS certificate
|
||||
|
||||
If you consider administrating your Proxmox instance from the **WEB GUI** over an insecure network (as Internet), you really should consider using a signed certificate, to prevent MITM attacks.
|
||||
If you consider administrating your Proxmox instance from the **Web GUI** over an insecure network (as Internet), you really should consider using a signed certificate, to prevent MITM attacks.
|
||||
For this, you can follow the official [ACME documentation](https://pve.proxmox.com/wiki/Certificate_Management).
|
||||
|
||||
### Conclusion
|
||||
|
Reference in New Issue
Block a user