NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to use in a distributed denial-of-service (DDoS) attack. Please also take this opportunity to defeat denial-of-service attacks by implementing ingress and Egress filtering through BCP38. See StartingNTPDev for discussion of this topic.
A new set of mode 6 vulnerabilities has been discovered and, while these vulnerabilities can be reduced by making sure you have
restrict default … noquery in your
ntp.conf file, the best and most complete way to avoid these vulnerabilities is to install and deploy
ntp-4.2.8 which was released on 18 December 2014.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
7. Starting NTP
7.2. How is NTP started?
On Unix-like operating systems NTP is started by an
script. If you are installing a pre-packaged version of NTP, the
script infrastructure may be pre-configured for you. If you are installing directly from the source you may have to manually configure your
system to start NTP at boot time.
7.3. When should NTP be started?
NTP should be started early in the boot process: after the network and DNS (if you are using any names instead of IP addresses for your servers/peers) are configured, but before any time-sensitive services are started.