NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38. See NTPAccessPolicyDev for discussion of this topic.
ntp-4.2.8p6 was released on 19 January 2016. It addresses 9 low- and medium-severity security issues, 10 bugfixes, and contains other improvements over 4.2.8p5.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
5.1. NTP Access Policy
It was proposed on news://comp.protocols.time.ntp
to publish the access policy for ntp via ntp/tcp.
Since ntp (the time protocol) only uses ntp/udp, ntp/tcp is available as a reserved port number
It would be possible to publish both a machine readable version (in some standard format, to be determined) and a human readable version.
A simple solution is to use
to offer a file on connection to ntp/tcp. Example line in inetd.conf:
ntp stream tcp nowait nobody /usr/libexec/tcpd /bin/cat /etc/ntp-access-policy.txt
would then contain the access policy.
- 28 Aug 2003