Citado nesta resposta perfeita
ISC ntpd (the ntp package) will open UDP 123 on all your interfaces regardless of what you do with it. It will work anyway even if you block this port in iptables, assuming that you're allowing responses to established traffic as usual - your outbound mobilization requests to your chosen servers will be enough to allow the responses, and the same with further traffic sent for the lifetime of ntpd. Using iptables like this is probably the easiest way to secure ntpd. There's also some defense in depth you can do: - run ntpd as non-root - run it chrooted to some safe directory (really only makes sense when doing non-root as well, since root can break out of a chroot) - apply ntpd's built-in access controls (see examples in ntpd.conf, and full docs in ntp_acc(5))
Para mais informações, por favor leia a resposta completa no link acima, Além disso, dê uma olhada para este responder no SU