Hi,
That was the hint I needed :)
Perhaps someone could put this information on the pool.ntp.org website,
I'm sure I'm not the only one with that problem...
FYI: I use the following iptables-rulse in my iptables-script:
[...]
FW=/sbin/iptables
IF="eth0"
[...]
$FW -t raw -A PREROUTING -i $IF -p udp --dport 123 -j NOTRACK
$FW -t raw -A PREROUTING -i $IF -p udp --sport 123 -j NOTRACK
$FW -t raw -A OUTPUT -o $IF -p udp --dport 123 -j NOTRACK
$FW -t raw -A OUTPUT -o $IF -p udp --sport 123 -j NOTRACK
$FW -A INPUT -i $IF -p udp --dport 123 -j ACCEPT
[...]
(yeah, lines 2 and 3 aren't needed, but it doesn't hurt to apply those
rules anyway...)
Works like a charm, my conntrack-table is almost empty now ;)
Thank you for your help!
Cheers,
Thomas
On 28.12.2009 01:22, Anthony DeRobertis wrote:
Check the iptables documentation for the NOTRACK target, you should be
able to exempt NTP from connection tracking entirely.
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers