Securing NTP (Linux Only)

NTP is used for ensuring the time on your dedicated server is accurate. Some configurations of this software cause it to be vulnerable to being abused to conduct DDoS attacks. We suggest fixing the server's configuration so it can no longer be abused.

To prevent abuse:
  1. Open your ntp.conf file (generally in /etc/ntp.conf)
  2. Remove any existing lines that begin with 'restrict'
  3. Add the following four lines to the beginning of the file:
    restrict default kod limited nomodify notrap nopeer noquery
    restrict -6 default kod limited nomodify notrap nopeer noquery
    restrict 127.0.0.1
    restrict -6 ::1
  4. Restart your NTP server with 'service ntpd restart' or 'service ntp restart'
  • 0 brukere syntes dette svaret var til hjelp
Var dette svaret til hjelp?

Relaterte artikler

Changing the Default SSH Port (Linux / CentOS)

SSH is one of the most commonly attacked services as it provides easy access to full control of...

Changing the Default SSH Port (Linux / Ubuntu / Debian)

SSH is one of the most commonly attacked services as it provides easy access to full control of a...

Disable Recursive DNS (Linux / Windows)

DNS is used to translate hostnames into IP addresses. When DNS servers are misconfigured, they...

Disabling SSDP (Linux / Windows)

SSDP is used by some consumer-level equipment for network discovery.  It does not have any real...

Enabling and basic configuration of the firewall settings (Linux / Ubuntu)

Enabling the firewall will help you protect your dedicated server from unwanted connections to...

Powered by WHMCompleteSolution