<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: System Clock Vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145107#M801744</link>
    <description>Hi&lt;BR /&gt;&lt;BR /&gt;Try a trace route to 209.195.3.50 and see where is stops&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Paula</description>
    <pubDate>Mon, 15 Dec 2003 14:08:24 GMT</pubDate>
    <dc:creator>Paula J Frazer-Campbell</dc:creator>
    <dc:date>2003-12-15T14:08:24Z</dc:date>
    <item>
      <title>System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145104#M801741</link>
      <description>Hello all-&lt;BR /&gt;  I am trying to syncronize my systems clocks with a Straus 2 server that is near me (U of Georgia). It is a easy fix but I get this error:&lt;BR /&gt;&lt;BR /&gt;"Could not establish connection. Either 209.195.3.50 is not availiable or firewall settings on your computer are blocking NTP connections" &lt;BR /&gt;&lt;BR /&gt;I'm Pretty sure it's the firewall. Which goes to my next question, How to I make it so the NTP connections don't get blocked? Thanks!&lt;BR /&gt;&lt;BR /&gt;Kyle</description>
      <pubDate>Mon, 15 Dec 2003 14:02:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145104#M801741</guid>
      <dc:creator>Kyle D. Harris</dc:creator>
      <dc:date>2003-12-15T14:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145105#M801742</link>
      <description>Check port required for ntp is open.&lt;BR /&gt;&lt;BR /&gt;contact ur firewall administrator&lt;BR /&gt;&lt;BR /&gt;ntp uses port 123.&lt;BR /&gt;&lt;BR /&gt;(Check /etc/services file)</description>
      <pubDate>Mon, 15 Dec 2003 14:04:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145105#M801742</guid>
      <dc:creator>RAC_1</dc:creator>
      <dc:date>2003-12-15T14:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145106#M801743</link>
      <description>Open up udp port 123. NTP is not considered to be a significant vulnerability.&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 14:07:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145106#M801743</guid>
      <dc:creator>A. Clay Stephenson</dc:creator>
      <dc:date>2003-12-15T14:07:39Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145107#M801744</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;Try a trace route to 209.195.3.50 and see where is stops&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Paula</description>
      <pubDate>Mon, 15 Dec 2003 14:08:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145107#M801744</guid>
      <dc:creator>Paula J Frazer-Campbell</dc:creator>
      <dc:date>2003-12-15T14:08:24Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145108#M801745</link>
      <description>The Port was open. NTP was listed as a "Medium Risk" on my Vulnerability sheet I got.</description>
      <pubDate>Mon, 15 Dec 2003 14:48:49 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145108#M801745</guid>
      <dc:creator>Kyle D. Harris</dc:creator>
      <dc:date>2003-12-15T14:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145109#M801746</link>
      <description>Hi Kyle,&lt;BR /&gt;&lt;BR /&gt;1) Verify the 123/UDP is open in *both* directions.&lt;BR /&gt;2) Verify that your host is allowed to connect to the UofG server.&lt;BR /&gt;3) Run netstat -an | grep 123 &amp;amp; make sure you have a line like&lt;BR /&gt;udp 0 0 *.123 *.*&lt;BR /&gt;&lt;BR /&gt;HTH,&lt;BR /&gt;Jeff&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Dec 2003 14:58:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145109#M801746</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2003-12-15T14:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145110#M801747</link>
      <description>What did you mean make sure the port is open in "both" directions??&lt;BR /&gt;&lt;BR /&gt;The traceroute stopped at 30 by the way.</description>
      <pubDate>Mon, 15 Dec 2003 15:05:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145110#M801747</guid>
      <dc:creator>Kyle D. Harris</dc:creator>
      <dc:date>2003-12-15T15:05:39Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145111#M801748</link>
      <description>By both directions I mean that 123/UDP traffic is allowed out as well as in through the firewall.&lt;BR /&gt;&lt;BR /&gt;And by stopped at 30 do you mean it made 30 hops &amp;amp; then stopped?&lt;BR /&gt;&lt;BR /&gt;If so you have a router out there that's sending you on a bad route. 30 hops is the max allowed for TCP connections.&lt;BR /&gt;&lt;BR /&gt;Are there a bunch that are all the same or a loop i.e. goes to router A &amp;amp; to router B &amp;amp; back to A &amp;amp; back to B &amp;amp; on &amp;amp; on? Then that's the problem.&lt;BR /&gt;&lt;BR /&gt;Rgds,&lt;BR /&gt;Jeff</description>
      <pubDate>Mon, 15 Dec 2003 15:09:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145111#M801748</guid>
      <dc:creator>Jeff Schussele</dc:creator>
      <dc:date>2003-12-15T15:09:23Z</dc:date>
    </item>
    <item>
      <title>Re: System Clock Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145112#M801749</link>
      <description>Yes, to 30, then the prompt came back up.</description>
      <pubDate>Mon, 15 Dec 2003 15:15:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/system-clock-vulnerability/m-p/3145112#M801749</guid>
      <dc:creator>Kyle D. Harris</dc:creator>
      <dc:date>2003-12-15T15:15:16Z</dc:date>
    </item>
  </channel>
</rss>

