The Transparent Inter-Process Communication (TIPC) protocol is designed to provide communication between cluster nodes. Rationale: If the protocol is not being used, it is recommended that kernel module not be loaded, disabling the service to reduce the potential attack surface.
Solution
Run the following script to disable tipc: #!/usr/bin/env bash { l_mname='tipc' # set module name if ! modprobe -n -v '$l_mname' | grep -P -- '^h*install /bin/(true|false)'; then echo -e ' - setting module: '$l_mname' to be not loadable' echo -e 'install $l_mname /bin/false' >> /etc/modprobe.d/'$l_mname'.conf fi if lsmod | grep '$l_mname' > /dev/null 2>&1; then echo -e ' - unloading module '$l_mname'' modprobe -r '$l_mname' fi if ! grep -Pq -- '^h*blacklisth+$l_mnameb' /etc/modprobe.d/*; then echo -e ' - deny listing '$l_mname'' echo -e 'blacklist $l_mname' >> /etc/modprobe.d/'$l_mname'.conf fi }