Issue: Nessus has identified all my CENTOS servers with this vulnerability Network Time Protocol NTP Mode 6 Scanner (97861)
OS: 6.1
Tech Note from Redhat: https://access.redhat.com/solutions/690293
Instructions I followed: I changed the /etc/ntp.conf to
restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery
This appears to NOT have solved the issue. Any advice on what would make this NTP mode 6 vulnerability go away?
Network Time Protocol NTP Mode 6 Scanner (97861)
-
- Posts: 4
- Joined: 2014/05/21 14:58:41
Re: Network Time Protocol NTP Mode 6 Scanner (97861)
See if yum update helps.
Re: Network Time Protocol NTP Mode 6 Scanner (97861)
And restarted ntpd after making that change?
The future appears to be RHEL or Debian. I think I'm going Debian.
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke
Info for USB installs on http://wiki.centos.org/HowTos/InstallFromUSBkey
CentOS 5 and 6 are deadest, do not use them.
Use the FAQ Luke
-
- Posts: 4
- Joined: 2014/05/21 14:58:41
Re: Network Time Protocol NTP Mode 6 Scanner (97861)
Yep that was it. What a duh moment.