Gui for configuring NTP

jdow jdow at earthlink.net
Sat Dec 10 05:22:49 UTC 2005


From: "taharka" <res00vl8 at alltel.net>

> Howdy,
> 
> On Fri, 2005-12-09 at 18:40 -0600, Nathaniel Hall wrote:
>> Scot L. Harris wrote: 
>> > On Fri, 2005-12-09 at 19:12, jdow wrote:
>> >   
>> > > From: "Paul Smith" <phhs80 at gmail.com>
>> > > 
>> > >     
>> > 
>> >   
>> > > > > > Is your iptables open for NTP?
>> > > > > > I have this:
>> > > > > > -A INPUT -s 66.187.233.4 -p udp -m udp --sport 123 --dport 123 -j ACCEPT
>> > > > > > -A INPUT -s 66.187.224.4 -p udp -m udp --sport 123 --dport 123 -j ACCEPT
>> > > > > >           
>> > > 
>> > > NOTE: that is only good if you have "clock1.redhat.com" as your clock
>> > > server. Make it correct for the clock server you select. You may have to
>> > > make it a range of addresses.
>> > > 
>> > >     
>> > 
>> > Why would you need to open these ports to have your system update it's
>> > time using NTP?  My systems seem to get NTP updates just fine sitting
>> > behind a firewall that does not have these ports opened.
>> > 
>> > 
>> >   
>> Then it isn't a firewall.  Well, I guess it could be, but it is a very
>> poor firewall.  I'll almost guarantee that the ports are open, you
>> just don't know it.
> That simply isn't so. All my systems are sitting behind a hardware
> firewall & I can guarantee that the ports are not open. The thing is,
> the firewall will cheerfully pass a request to the outside from a client
> system & return whatever is requested. Unless, some sort of rule is set
> explicitly telling it not to do so. This is the way a firewall is
> supposed to work.

<voice, Gildersleeve>Oh reeeeaaally!</voice>

I always set firewalls to drop packets unless told by some other rule
to do something with them. The old "ipfwd" did not do a good job with
regards to UDP "connections" such as "ntp" uses. So I generally had to
explicitly open the firewall holes needed to pass the external DNS
servers and NTP servers I used. The initial (more or less direct
translation) I used with iptables suffered the same problem. As I 
became more proficient with iptables and trimmed cruft (and used
ip_connect_track) the UDP issue subsided.

BUT, I had to EXPLICITLY tell the firewall I wanted connections
tracked before a packet could make it through the firewall. The basic
rule is to simply drop incoming packets I do not ask for or are rogue
on the floor.

{^_^}




More information about the users mailing list