From owner-freebsd-hackers@freebsd.org Thu Feb 21 09:15:31 2019 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id EB4F214FEF61 for ; Thu, 21 Feb 2019 09:15:30 +0000 (UTC) (envelope-from bblister@gmail.com) Received: from n6.nabble.com (n6.nabble.com [162.255.23.37]) by mx1.freebsd.org (Postfix) with ESMTP id DE1846812B for ; Thu, 21 Feb 2019 09:15:29 +0000 (UTC) (envelope-from bblister@gmail.com) Received: from n6.nabble.com (localhost [127.0.0.1]) by n6.nabble.com (Postfix) with ESMTP id 5CCA9C773543 for ; Thu, 21 Feb 2019 02:15:28 -0700 (MST) Date: Thu, 21 Feb 2019 02:15:28 -0700 (MST) From: BBlister To: freebsd-hackers@freebsd.org Message-ID: <1550740528377-0.post@n6.nabble.com> In-Reply-To: <877baa2abd2c062a389b88e66dd67f1fba032e93.camel@freebsd.org> References: <1550610819543-0.post@n6.nabble.com> <7b44b3ce-9b96-e91b-b9ca-57100c784db7@sentex.net> <20190219220404.GA1668@troutmask.apl.washington.edu> <1550671337578-0.post@n6.nabble.com> <877baa2abd2c062a389b88e66dd67f1fba032e93.camel@freebsd.org> Subject: Re: userland process rpc.lockd opens untraceable ports...is something wrong here? MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Rspamd-Queue-Id: DE1846812B X-Spamd-Bar: ++ Authentication-Results: mx1.freebsd.org; dmarc=fail reason="" header.from=gmail.com (policy=none); spf=softfail (mx1.freebsd.org: 162.255.23.37 is neither permitted nor denied by domain of bblister@gmail.com) smtp.mailfrom=bblister@gmail.com X-Spamd-Result: default: False [2.71 / 15.00]; ARC_NA(0.00)[]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[gmail.com]; TO_MATCH_ENVRCPT_ALL(0.00)[]; MIME_GOOD(-0.10)[text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; TO_DN_NONE(0.00)[]; R_SPF_SOFTFAIL(0.00)[~all]; RCPT_COUNT_ONE(0.00)[1]; NEURAL_SPAM_MEDIUM(0.47)[0.473,0]; SUBJECT_ENDS_QUESTION(1.00)[]; NEURAL_SPAM_SHORT(0.69)[0.686,0]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_SPAM_LONG(0.33)[0.326,0]; RCVD_IN_DNSWL_NONE(0.00)[37.23.255.162.list.dnswl.org : 127.0.10.0]; IP_SCORE(0.13)[ip: (0.54), ipnet: 162.255.20.0/22(0.14), asn: 21624(0.04), country: US(-0.07)]; RCVD_NO_TLS_LAST(0.10)[]; FROM_EQ_ENVFROM(0.00)[]; R_DKIM_NA(0.00)[]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:21624, ipnet:162.255.20.0/22, country:US]; RCVD_COUNT_TWO(0.00)[2]; FREEMAIL_ENVFROM(0.00)[gmail.com]; DMARC_POLICY_SOFTFAIL(0.10)[gmail.com : No valid SPF, No valid DKIM,none] X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 21 Feb 2019 09:15:31 -0000 Nice explanation, but why the rpcinfo -p does not print all the ports that rpc.lockd is using? Perhaps rpcinfo is not IPV6 compatible, but can only locate ipv4 ports? The conclusion is that if something is reported by sockstat with '?' in the process name, this means that the kernel has opened it. Is this correct? Thanks again for clarifying this, Rgz, BB -- Sent from: http://freebsd.1045724.x6.nabble.com/freebsd-hackers-f4034256.html