Hello,
I am running ntp-4.2.8p10.

I have a user who is complaining that we are responding to mode 6 requests as 
follows:

[www@eng ~]$ ntpq -c rv 192.xx.xx.xx
associd=0 status=0615 leap_none, sync_ntp, 1 event, clock_sync,
version="ntpd 4.2.8p10@1.3728<mailto:4.2.8p10@1.3728> Thu Jul 12 18:15:43 UTC 
2018 (1)",
processor="ppc", system="Linux/2.6.22", leap=00, stratum=4,
precision=-12, rootdelay=43.665, rootdisp=89.247, refid=192.168.56.185,
reftime=e0f2824f.423d1b2d  Mon, Aug  5 2019  6:24:15.258,
clock=e0f289e9.82f3c482  Mon, Aug  5 2019  6:56:41.511, peer=32846,
tc=10, mintc=3, offset=-2.945153, frequency=6.130, sys_jitter=0.000000,
clk_jitter=0.993, clk_wander=0.149
[www@eng ~]$
I see that NTP Bug 3118 for CVE-2016-9310 was addressed in 4.2.8p9.

Forgive me for my lack of knowledge in this area, but does the above command 
and output still show the vulnerability?
If so, is the fix (as NTP Bug 3118  explains) to add "restrict default noquery" 
to the ntp.conf file?
If this is the fix, then all queries are shutoff, correct?

Thanks for any assistance you can provide.
Phil
_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to