Hi, I *think* my server is not vulnerable, but I would like to make sure it is not.
Is there an "official" list outside with some commands to test against the servers? I think this would help some people hardening their setups... (With "some people" I'm including me, too ;-) ) Greetings from Wuppertal Max Am 30.12.2013 22:11, schrieb Brian Rak: > If anyone is running a pool server, and has not disabled querying in > some way (noquery, disable monitor, NTPD upgrade, etc), please do so > ASAP. We were hit with multiple 40+ gbps attacks over the weekend, all > using NTP reflection. This has become a critical issue, and running > your server with query enabled is actively harming other machines on the > internet. > > NTP pool machines could be some of the worst offenders, as your monlist > output is going to be very large (as compared to a machine that's just a > client). > > Please, take a few minutes and verify that you are not vulnerable to this. > > > Can we get this information added to the pool configuration > recommendations? http://www.pool.ntp.org/join/configuration.html > > On 12/29/2013 8:08 PM, Ask Bjørn Hansen wrote: >> Adding "noquery" to the default restrict line should work, too. >> _______________________________________________ >> pool mailing list >> [email protected] >> http://lists.ntp.org/listinfo/pool > > _______________________________________________ > pool mailing list > [email protected] > http://lists.ntp.org/listinfo/pool _______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool
