Wondering how to disable Port 113 IDENT Requests? We can help you.
The Ident Protocol (Identification Protocol, Ident), is an Internet protocol that helps identify the user of a particular TCP connection. One popular daemon program for providing the ident service is identd.
Auth/Ident servers that usually run on the local user’s machine often end up with open port 113 and listen for incoming connections and queries from remote machines.
Generally, these querying machines provide a local and remote “port pair” describing some other already-existing connection between the machines. As a result, The user’s “ident” server is tasked with looking up and returning the connection’s “USER ID” and perhaps additional information, such as an email address, full name,
Here at Bobcares, we often get requests from our customers to fix issues regarding port 113 IDENT requests as a part of our Server Management Services. Today, let’s see how our Support techs disable this for our customers.
What causes Port 113 IDENT Requests
Generally, we can see port 113 return requests in any of the following:
1. From Nagios XI server to the originating host when submitting NSCA passive results.
2. While checking NRPE services.
3. On the firewall logs.
Common causes for this issue is given below:
1. This is usually seen when we are running an NRPE check through XINETD with USERID included on the log_on_success or log_on_failure options in remote hosts /etc/xinetd.d/nrpe file.
2. It could also be because we are submitting passive results to the XI server through NSCA (which is running under XINETD) /etc/xinetd.d/nsca with the same options.
We must keep in mind that the USERID option requires an IDENT request to port 113 on the originating server to determine the USERID, that is why we can see it.
How to Disable Port 113 IDENT Requests
Then remove the USERID option from the log_on_failure AND log_on_success to stop the IDENT from occurring.
The file we need to change depends on:
1. NRPE on remote host
/etc/xinetd.d/nrpe
2. NSCA on Nagios XI server
/etc/xinetd.d/nsca
We can either comment this line out or remove it completely:
# default: on
# description: NSCA (Nagios Service Check Acceptor)
service nsca
{
flags = REUSE
socket_type = stream
wait = no
user = nagios
group = nagios
server = /usr/local/nagios/bin/nsca
server_args = -c /usr/local/nagios/etc/nsca.cfg --inetd
log_on_failure += USERID
disable = no
only_from = 127.0.0.1
}
Once the changes are made, we need to restart the xinetd service using either of the commands below:
RHEL 7+|CentOS 7+|Oracle Linux 7+|Debian|Ubuntu 16/18/20
systemctl restart xinetd.service
[Need Assistance? We are available 24*7]
Conclusion
In short, we saw what causes port 113 IDENT requests along with the steps that our Support Techs follow to disable this for our customers.
0 Comments