Seven steps to secure ntp servers from DDoS attacks
Network time protocol (ntp) servers are regularly being used to reflect and amplify spoofed UDP packets towards the target of a DDoS attack. Attacks are growing in size and frequency and sometimes even cause issues for the organisations hosting the reflectors. Servers offering the 'monlist' command are particularly troublesome and can provide a huge amplification affect.
Securing ntp servers on your network not only stops you from becoming involved in an attack on another network, but also saves you from the costs and interruptions to service that the attack may cause on your own infrastructure.
- To locate any ntp servers on your networks that respond to the monlist command. http://openntpproject.org/ surveys the Internet for ntp servers and is a useful starting point. A script for nmap may give you a more thorough look at the current state of your network. An individual server can be tested with the following commands:
$ ntpdc -n -c monlist <a.b.c.d>
or
$ ntpq -c rv <a.b.c.d>
- Minimise your exposure by removing or disable any unnecessary ntp servers that you find.
- If any of the remaining ntp servers can be isolated from the Internet by a firewall, do so. You might be considering blocking all ntp traffic but this can have an impact on legitimate services. Do so carefully.
- If possible upgrade the software to NTP-4.2.7p26 or later. This version removes the monlist command.
- In older versions you can add 'disable monitor' to your ntp.conf configuration file.
- Team Cymru provide secure configuration templates for Cisco IOS, Juniper JUNOS and ntpd.
- For other systems contact your vendor for advice and support.
If you need any further advice on how to secure your ntp configuration please contact Janet CSIRT.