I have NTP disabled in my network. I've also noticed that 40% of my packet filter violations are NTP related (UDP port 123).
I've read that NTP security concerns are: "It provides both info and an avenue of attack for intruders. Info gathered can include: system uptime, time since reset, time server pkt, I/O, & memory statistics, and ntp peer list. Further, if a host is susceptible to time altering via ntp, an attacker can: 1) Run replay attacks, using captured OTP and Kerberos tickets before they expire. 2) Stop security-related cron jobs from running or cause them to run at incorrect times. 3) Make system and audit logs unreliable, since time is alterable."
Do ASG users here recommend enabling or keeping NTP disabled?
Thoughts/Opinions welcomed!
Thanks,
-Da
This thread was automatically locked due to age.