• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer navigation

The Geek Diary

  • OS
    • Linux
    • CentOS/RHEL
    • Solaris
    • Oracle Linux
    • VCS
  • Interview Questions
  • Database
    • oracle
    • oracle 12c
    • ASM
    • mysql
    • MariaDB
  • DevOps
    • Docker
    • Shell Scripting
  • Big Data
    • Hadoop
    • Cloudera
    • Hortonworks HDP

How to Disable rpc.quotad Service in CentOS/RHEL 6 and 7

by admin

This post explains how to disable rpc.quotad service on CentOS/RHEL 6 or 7 machines. The protocol used by rpc.rquotad is an unsecured and obsolete protocol and should be disabled.

Note: This procedure can disrupt NFS clients relying on disk quotas. To avoid issues, schedule a maintenance outage and stop these NFS clients.

For CentOS/RHEL 6 or earlier

1. Edit the configuration file /etc/sysconfig/nfs to have an entry which reads RQUOTAD=”no”. For example:

# grep RQUOTAD /etc/sysconfig/nfs
# The below line disables the insecure, obsolete quota protocol used by RQUOTAD
RQUOTAD="no"

2. Restart the NFS service for the changes to come in effect.

# service nfs stop
# service nfs start

For CentOS/RHEL 7 or later

CentOS/RHEL 7 uses systemd to manage services. The mask operation prevents even root from starting the service:

1. Stop and disable the rpc-rquotad.service with systemctl command:

# systemctl stop rpc-rquotad.service
# systemctl disable rpc-rquotad.service

2. Mask the service to completely disable it from starting even with root user access.

# systemctl mask rpc-rquotad.service

3. Take a restart of the service to verify that the service does not start.

# systemctl restart rpc-rquotad.service
Failed to restart rpc-rquotad.service: Unit is masked.
If you verify the status again, it should be "masked"
# systemctl status rpc-rquotad.service
● rpc-rquotad.service
Loaded: masked (/dev/null; bad)
Active: inactive (dead
 https://nvd.nist.gov/vuln/detail/CVE-1999-0625

Conclusion

rpc.rquotad is an unsecured and obsolete protocol and it should be disabled. This post outlines the steps to disable it in CentOS/RHEL system. In the case of CentOS/RHEL 7 and later, the service is also masked in order that no user including root can start it.

Filed Under: CentOS/RHEL 5, CentOS/RHEL 6, CentOS/RHEL 7, CentOS/RHEL 8, Linux

Some more articles you might also be interested in …

  1. CentOS / RHEL 6,7 : How to configure hugepages
  2. How to enable core dump for Applications on CentOS/RHEL
  3. CentOS / RHEL : How to exclude kernel or other packages from getting updated using YUM Versionlock Plugin
  4. Understanding Samba utilities – nmblookup, smbstatus, smbtar, testparm, wbinfo, smbget
  5. What is ioremap()
  6. dpkg-reconfigure Command Options
  7. Linux OS Service ‘network’
  8. How to Change Time Interval to Fall Back to Secondary DNS Server in CentOS/RHEL
  9. CentOS / RHEL 5 : How to disable device mapper multipath (dm-multipath)
  10. How to Make User Account Read-Only in CentOS/RHEL 7

You May Also Like

Primary Sidebar

Recent Posts

  • JavaFX ComboBox: Set a value to the combo box
  • Nginx load balancing
  • nginx 504 gateway time-out
  • Images preview with ngx_http_image_filter_module

© 2022 · The Geek Diary

  • Archives
  • Contact Us
  • Copyright