Uh... ntpd is not in there. This is my dev machine. nmap has an option to dump some version info.
Try my switches on your machine... > On May 14, 2016, at 6:04 PM, Gary E. Miller <g...@rellim.com> wrote: > > Yo Daniel! > > On Sat, 14 May 2016 17:03:09 -0500 > Daniel Poirot <dtpoi...@gmail.com> wrote: > >> Nmap is all about the options! > > Really? And where do you see ntpd in there? How do you know you > are running NTPsec, or NTP classic, or Chronyd? > > RGDS > GARY > --------------------------------------------------------------------------- > Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703 > g...@rellim.com Tel:+1 541 382 8588 > >> >> siguser@jasper:~$ sudo nmap -sV -T4 -O -F --version-light >> 192.168.56.101 [sudo] password for siguser: >> >> Starting Nmap 6.40 ( http://nmap.org ) at 2016-05-14 04:16 CDT >> Nmap scan report for 192.168.56.101 >> Host is up (0.000014s latency). >> Not shown: 90 closed ports >> PORT STATE SERVICE VERSION >> 22/tcp open ssh (protocol 2.0) >> 25/tcp open smtp Postfix smtpd >> 80/tcp open http Apache httpd 2.4.7 ((Ubuntu)) >> 110/tcp open pop3 Dovecot pop3d >> 143/tcp open imap Dovecot imapd >> 389/tcp open ldap OpenLDAP 2.2.X - 2.3.X >> 465/tcp open ssl/smtp Postfix smtpd >> 587/tcp open smtp Postfix smtpd >> 993/tcp open ssl/imap Dovecot imapd >> 995/tcp open ssl/pop3 Dovecot pop3d >> No exact OS matches for host (If you know what OS is running on it, >> see http://nmap.org/submit/ ). >> >> >>> On May 14, 2016, at 4:50 PM, Gary E. Miller <g...@rellim.com> wrote: >>> >>> Yo Daniel! >>> >>> On Sat, 14 May 2016 16:24:27 -0500 >>> Daniel Poirot <dtpoi...@gmail.com> wrote: >>> >>>> Try nmap/zenmap... >>> >>> Not much there. NTP protocol is UDP only. Here is an NTPsec: >>> >>> dagwood portage # nmap -sUV -p 123 pi2 >>> >>> Starting Nmap 7.12 ( https://nmap.org ) at 2016-05-14 14:48 PDT >>> Nmap scan report for pi2 (204.17.205.17) >>> Host is up (0.00079s latency). >>> rDNS record for 204.17.205.17: pi2.rellim.com >>> PORT STATE SERVICE VERSION >>> 123/udp open ntp NTP v4 (primary server) >>> MAC Address: B8:27:EB:18:89:B5 (Raspberry Pi Foundation) >>> >>> And here is a chronyd: >>> >>> dagwood portage # nmap -sUV -p 123 kong >>> >>> Starting Nmap 7.12 ( https://nmap.org ) at 2016-05-14 14:48 PDT >>> Nmap scan report for kong (204.17.205.27) >>> Host is up (0.00077s latency). >>> Other addresses for kong (not scanned): 2001:470:e815::27 >>> 2001:470:e815:0:225:90ff:fef3:55da rDNS record for 204.17.205.27: >>> kong.rellim.com PORT STATE SERVICE VERSION >>> 123/udp open ntp NTP v4 (primary server) >>> MAC Address: 00:25:90:F3:55:DB (Super Micro Computer) _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel