Q. How do I secure the portmap service? I am using Debian Linux.


A. According to wikipedia, “Portmap is server software running under Unix-like systems that converts RPC program numbers into DARPA protocol port numbers. Its design objective was to minimize the number of ports in use, but this never happened as it never had wide adoption. It must be running in order to make RPC calls.

When an RPC server is started, it will tell portmap what port number it is listening to, and what RPC program numbers it is prepared to serve. When a client wishes to make an RPC call to a given program number, it will first ontact portmap on the server machine to determine the port number where RPC packets should be sent.

It is extensively used by NIS, NFS, and FAM. It is used to assign a dynamic port to NIS and NFS.

You can protect portmap with:
=> TCP Wrappers

=> Iptables

TCP Wrappers

If you’re going to protect the portmapper use the name “portmap” for the daemon name. Remember that you can only use the keyword “ALL” and IP addresses (NOT host or domain names) for the portmapper, as well as for rpc.mountd (the NFS mount daemon).
Open /etc/hosts.allow file:
# vi /etc/hosts.allow
Sample entires for portmap server to allow access from only.
sshd : ALL
portmap :

Save and close the file.

IPTables portmap rules

Portmap listens on port 111. Add following rules to your iptables:

Drop UPD port 111 packets if they are not from
iptables -A INPUT -p udp -s! --dport 111 -j DROP

Drop TCP port 111 packets if they are not from and localhost (
iptables -A INPUT -p tcp -s! --dport 111 -j DROP
iptables -A INPUT -p tcp -s --dport 111 -j ACCEPT

For more information refer to following man pages:
man iptables
man tcpd
man 5 hosts_access
man portmap

🥺 Was this helpful? Please add a comment to show your appreciation or feedback.

nixCrat Tux Pixel Penguin
Hi! 🤠
I'm Vivek Gite, and I write about Linux, macOS, Unix, IT, programming, infosec, and open source. Subscribe to my RSS feed or email newsletter for updates.

3 comments… add one
  • Ronald Nov 19, 2008 @ 13:32


    Thank you for this quick and easy guide. It’s much appreciated!


  • Rober Aug 5, 2016 @ 11:35

    iptables -A INPUT -p udp -s! –dport 111 -j DROP
    returns Bad argument em network address.

  • Denis Aug 22, 2016 @ 13:43

    Actually the syntax is … ! -s … and not … -s! …, the exclamation mark must stand alone in front of the -s option.

Leave a Reply

Your email address will not be published. Required fields are marked *

Use HTML <pre>...</pre> for code samples. Your comment will appear only after approval by the site admin.