How to Configure Authenticated NTP Using Autokey
Issue
- NTP connections should only be used via authentication
- Increases likelihood of reliable timesource
- Lessens chance of attackers broadcasting incorrect time
Environment
- Red Hat Enterprise Linux 5
- Red Hat Enterprise Linux 6
Subscriber exclusive content
A Red Hat subscription provides unlimited access to our knowledgebase, tools, and much more.