Securing NTP (Linux Only)

NTP is used for ensuring the time on your dedicated server is accurate. Some configurations of this software cause it to be vulnerable to being abused to conduct DDoS attacks. We suggest fixing the server's configuration so it can no longer be abused.

To prevent abuse:

  1. Open your ntp.conf file (generally in /etc/ntp.conf)
  2. Remove any existing lines that begin with 'restrict'
  3. Add the following four lines to the beginning of the file:
  4. restrict default kod limited nomodify notrap nopeer noquery
  5. restrict -6 default kod limited nomodify notrap nopeer noquery
  6. restrict 127.0.0.1
  7. restrict -6 ::1
  8. Restart your NTP server with 'service ntpd restart' or 'service ntp restart'
  • Securing NTP
  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

Securing SNMP (Linux / Windows)

SNMP is used for remote monitoring and configuration of dedicated servers. If you have not...

Enabling and basic configuration of the firewall settings (Linux / Ubuntu)

Enabling the firewall will help you protect your dedicated server from unwanted connections to...

Disabling SSDP (Linux / Windows)

SSDP is used by some consumer-level equipment for network discovery. It does not have any real...

Disable Recursive DNS (Linux / Windows)

DNS is used to translate hostnames into IP addresses. When DNS servers are misconfigured, they...

Changing the Default SSH Port (Linux / Ubuntu / Debian)

SSH is one of the most commonly attacked services as it provides easy access to full control of a...