Ask Bjørn Hansen wrote:
You are right that strictly speaking in the context of this list “you should 
upgrade” is not completely unreasonable, but for “regular users” knowing more 
details about the scope and the mitigation options than was listed in the 
announcement would be nice.

Most of us running ntpd’s that participate in the NTP Pool also have numerous 
other devices with NTP software.

As far as I understand the reports on bugzilla the main vulnerabilities are in functions where signed packets (symmetric key or autokey) are used, or dynamic/remote configuration via ntpq and/or ntpdc is enabled, which, as far as I know also requires some sort of crypto top be enabled.

So from my understanding disabling crypto in ntp.conf should avoid the main vulnerabilities as a first, quick step.

Martin

_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to