Securing NTP (Linux Only)

  • Last Created On Dec 10, 2024
  • 35
0 0

NTP is used for ensuring the time on your dedicated server is accurate. Some configurations of this software cause it to be vulnerable to being abused to conduct DDoS attacks. We suggest fixing the server’s configuration so it can no longer be abused.

To prevent abuse:

  1. Open your ntp.conf file (generally in /etc/ntp.conf)
  2. Remove any existing lines that begin with ‘restrict’
  3. Add the following four lines to the beginning of the file:
  4. restrict default kod limited nomodify notrap nopeer noquery
  5. restrict -6 default kod limited nomodify notrap nopeer noquery
  6. restrict 127.0.0.1
  7. restrict -6 ::1
  8. Restart your NTP server with ‘service ntpd restart’ or ‘service ntp restart’
Views: 35

Recent Articles

  • How to Install JAX with ROCm Acceleratio...
    847
  • Deploy a PyTorch Workspace on a Vultr Cl...
    506
  • Managing Backup Storage
    542
  • Automating FTP Backups in Windows Server
    515
  • Automating FTP Backups in Linux
    494

Popular Articles

  • Our General Terms & Conditions
    13613
  • Our Privacy Policy
    12990
  • Our Cookies Policy
    1487
  • How to Install JAX with ROCm Acceleratio...
    847
  • Our Terms of Use
    838