As part of your system hardening activities, prevent the Transparent Inter-Process Communication protocol (TIPC) from loading on your virtual appliance host machines by default. Potential attackers can exploit this protocol to compromise your system.

Binding the TIPC protocol to the network stack increases the attack surface of the host. Unprivileged local processes can cause the kernel to dynamically load a protocol handler by using the protocol to open a socket.


  1. Open the /etc/modprobe.d/modprobe.conf file in a text editor.
  2. Ensure that the install tipc /bin/false line appears in this file.
  3. Save the file and close it.