[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Port 123 and ipv6



Henning Follmann <hfollmann@itcfollmann.com> wrote:
> On Tue, Jan 28, 2014 at 01:43:17PM +0800, lina wrote:

>> I read something online, and wonder:
>> 1] shall I close the port 123
>> 2] disable ipv6
>> 
>> Shall I follow the advice from https://wiki.debian.org/DebianIPv6 to
>> turn off the ipv6 in wheezy as in squeeze,

> STOP NTP!
> ntpd is currently abused as a DDOS attack vector.
> If your ntpd responds to ntpdc -n -c monlst <IP of ntpd>
> you have to disable the monitor function (at least).

If you have not "butchered" the default ntp.conf from the debian
package, there is no need to be hasty, as the Debian default is safe and
cannot be used for the mentioned DDoS attack.

Just check if the following lines are present and active in your
ntp.conf:

restrict -4 default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery

Grüße,
Sven.

-- 
Sigmentation fault. Core dumped.


Reply to: