Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Is this normal in UTM 9.2 ....

ntp server is not hardened enought ?

ntpq -c rv "UTM92-IP"
associd=0 status=0615 leap_none, sync_ntp, 1 event, clock_sync,
version="ntpd 4.2.6p5@1.2349 Tue Feb  4 13:03:59 UTC 2014 (1)",
processor="x86_64", system="Linux/3.8.13.27-32.g5666955-smp64", leap=00,
stratum=3, precision=-22, rootdelay=55.022, rootdisp=65.708,
refid=37.187.107.140,
reftime=d82f3c76.fed524c4  Sun, Dec  7 2014 21:52:06.995,
clock=d82f3c98.714de5fe  Sun, Dec  7 2014 21:52:40.442, peer=54678, tc=7,
mintc=3, offset=0.498, frequency=-14.866, sys_jitter=0.752,
clk_jitter=0.624, clk_wander=0.086

... sophos utm and ntp stack is open .... 

"How can I check my server? - run the command ntpdc -n -c monlist 192.0.2.1 or ntpq -c rv 192.0.2.1 - If you see a response, your server may be used in attacks."

good job ...

bye


This thread was automatically locked due to age.
Parents Reply Children
  • Hi.

    I can confirm that UTM currently only disables the monlist command, it does not completely disable all query commands. The monlist command was the one used originally for the DDoS attacks and has a much higher amplication factor than all other commands.

    We will investigate whether it might be better to disable queries completely.

    Regards,
      Frank
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?