On 2013-12-23, Jure Sah <dustwo...@gmail.com> wrote: > I am an administrator of a public NTP server joined to "pool.ntp.org". > Our server has recently been an unwilling party to a NTP UDP based > bounce attack and have received the report attached below.
[snip] > I am using ntpd version 4.2.6p3. I have searched trough the > www.pool.ntp.org website on the subject and could not find any general > recommendation for a secure setup, however I might not have been > looking in the right places. If you must continue to use NTP <= 4.2.7 add 'noquery' to your default restrictions. The current NTP development release includes some anti spoofing technology and does not require the use of 'noquery'. BTW: NTP Community Supported Documentation is located at http://support.ntp.org/support -- Steve Kostecke <koste...@ntp.org> NTP Public Services Project - http://support.ntp.org/ _______________________________________________ questions mailing list questions@lists.ntp.org http://lists.ntp.org/listinfo/questions