Hi
Got the snort email alert too.
Nothing pressing here since RPC does not run here, it is usually not needed.
If it is not running it cannot be exploited !
Will upgrade soon anyway.
Since you don't have a Lan setup yet
you certainly don't need/use NIS, NFS or r services.(might be more rpc uses: don't know)
i.e. you don't need rpc services.
Turn them off (portmap, nfs, nis).
rpcinfo -p (to check)
(you can always turn them back on if needed or if something breaks!?)
However if your router device can firewall too
and you need NFS(soon will be openafs for me) on lan(remove r services use ssh instead)
make sure it does not allow outside(web) connections to ports.(/etc/services)
sunrpc 111/tcp portmapper # RPC 4.0 portmapper TCP
sunrpc 111/udp portmapper
My firewall machine often drops port 111 attempts even though that port is not open !
(They are fishing in an empty ocean)
Hope your plain ML security settings include a firewall denying
what you do not what to supply to the www.
Some reading:
The Linux System Administrators' Guide
at
http://www.tldp.org/guides.html
Ch. 12 Remote Procedure Call
HIH