Zitat von [email protected]:

Zitat von Martin Burnicki <[email protected]>:

Ask Bjørn Hansen wrote:
You are right that strictly speaking in the context of this list “you should upgrade” is not completely unreasonable, but for “regular users” knowing more details about the scope and the mitigation options than was listed in the announcement would be nice.

Most of us running ntpd’s that participate in the NTP Pool also have numerous other devices with NTP software.

As far as I understand the reports on bugzilla the main vulnerabilities are in functions where signed packets (symmetric key or autokey) are used, or dynamic/remote configuration via ntpq and/or ntpdc is enabled, which, as far as I know also requires some sort of crypto top be enabled.

So from my understanding disabling crypto in ntp.conf should avoid the main vulnerabilities as a first, quick step.

Martin


It would be really helpful to get a configuration hint how to avoid at least most of the problems. We have a standard Linux distribution with their shippment of ntpd in the pool and as no fix is available from them and it may take a while our only option is to leave the pool or to take the risk of loosing the server to the bad ones. For most of us the servers provided are used for other work and are not dedicated for ntp so clearly without a configuration workaround we will shutdown ntpd immediately :-(

So the question still is:

are we save for the first three flaws listed when not using crypto/auth in any way and what configuration parameter we have to check ?

is the ctl_putdata() exploitable in any configuration accepting queries as i suspect ?

what is about "Buffer overflow in configure()" is it only exploitable when using remote configuration or not?

Thanks for any hints

Andreas


Ubuntu still has no patches as of now and no one was able or willing to comment on configuration workarounds so we are out of the pool for now.

Andreas


_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to