"Fw: NTP Amplification Attacks Using CVE-2013-5211 | US-CERT" on Show IP Protocols |
![]() |
Fw: NTP Amplification Attacks Using CVE-2013-5211 | US-CERT Posted: 16 Jan 2014 03:54 AM PST
If you are running NTP Daemon, remember to upgrade to Version 4.2.7, or just disable “monlist” functionality. NTP Amplification Attacks Using CVE-2013-5211 | US-CERT: I believe IT administrators should react immediately even if you run NTP Daemon only inside your corporate network. Any insider knows this caveat could make you in trouble easily. How to disable "monlist"? To disable “monlist” functionality on a public-facing NTP server that cannot be updated to 4.2.7, add the “noquery” directive to the “restrict default” line in the system’s ntp.conf, as shown below:restrict default kod nomodify notrap nopeer noquery Where to get updated NTP Daemon software? NTP Download Page is here. References NTP Amplification Attacks Using CVE-2013-5211 | US-CERT |
You are subscribed to email updates from Show IP Protocols
To stop receiving these emails, you may unsubscribe now. |
Email delivery powered by Google |
Google Inc., 20 West Kinzie, Chicago IL USA 60610 |