<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ntp in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819340#M489192</link>
    <description>&lt;P&gt;We are currently running servers on HP11.31 with the ntp version running being 4.2.6.5.0.&lt;/P&gt;&lt;P&gt;We have been told by our security group that we should upgrade ntp to 4.2.7p26. The latest version available for hpux being 4.2.6.6.0.&lt;/P&gt;&lt;P&gt;The reason we have been told to upgrade is:&lt;/P&gt;&lt;P&gt;The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source. The monlist feature in ntp_request.c in ntpd in NTP allows remote attackers to cause a denial of service (traffic amplification) via forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests. This issue allows an attacker to perform reflection distributed denial of service attacks.&lt;/P&gt;&lt;P&gt;As a workaround (due to the correct release not being available [yet]) is to add the following two lines to ntp.conf:&lt;/P&gt;&lt;P&gt;restrict default kod nomodify notrap nopeer noquery&lt;BR /&gt;restrict -6 default kod nomodify notrap nopeer noquery&lt;/P&gt;&lt;P&gt;Does anybody out there know if this is correct or not or when the 4.2.7p26 version of ntp will be available for hpux.&lt;BR /&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Dec 2015 18:25:34 GMT</pubDate>
    <dc:creator>Mark Parsons</dc:creator>
    <dc:date>2015-12-17T18:25:34Z</dc:date>
    <item>
      <title>ntp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819340#M489192</link>
      <description>&lt;P&gt;We are currently running servers on HP11.31 with the ntp version running being 4.2.6.5.0.&lt;/P&gt;&lt;P&gt;We have been told by our security group that we should upgrade ntp to 4.2.7p26. The latest version available for hpux being 4.2.6.6.0.&lt;/P&gt;&lt;P&gt;The reason we have been told to upgrade is:&lt;/P&gt;&lt;P&gt;The Network Time Protocol (NTP) is used to synchronize the time of a computer client or server to another server or reference time source. The monlist feature in ntp_request.c in ntpd in NTP allows remote attackers to cause a denial of service (traffic amplification) via forged REQ_MON_GETLIST or REQ_MON_GETLIST_1 requests. This issue allows an attacker to perform reflection distributed denial of service attacks.&lt;/P&gt;&lt;P&gt;As a workaround (due to the correct release not being available [yet]) is to add the following two lines to ntp.conf:&lt;/P&gt;&lt;P&gt;restrict default kod nomodify notrap nopeer noquery&lt;BR /&gt;restrict -6 default kod nomodify notrap nopeer noquery&lt;/P&gt;&lt;P&gt;Does anybody out there know if this is correct or not or when the 4.2.7p26 version of ntp will be available for hpux.&lt;BR /&gt;Many thanks in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 18:25:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819340#M489192</guid>
      <dc:creator>Mark Parsons</dc:creator>
      <dc:date>2015-12-17T18:25:34Z</dc:date>
    </item>
    <item>
      <title>Re: ntp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819592#M489197</link>
      <description>&lt;P&gt;The latest version below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Release date&lt;/P&gt;&lt;P&gt;NTPv4&amp;nbsp;HP-UX 11i v3&amp;nbsp;C.4.2.6.6.0&amp;nbsp;May 2015&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 15:36:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819592#M489197</guid>
      <dc:creator>Ajin_1</dc:creator>
      <dc:date>2015-12-18T15:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: ntp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819595#M489198</link>
      <description>&lt;P&gt;That is the version we have currently loaded!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 15:40:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819595#M489198</guid>
      <dc:creator>Mark Parsons</dc:creator>
      <dc:date>2015-12-18T15:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: ntp</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819598#M489200</link>
      <description>&lt;P&gt;It seemed a bit silly to go from 4.2.6.5 to 4.2.6.6 but I did it anyway.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 15:43:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/ntp/m-p/6819598#M489200</guid>
      <dc:creator>Mark Parsons</dc:creator>
      <dc:date>2015-12-18T15:43:15Z</dc:date>
    </item>
  </channel>
</rss>

