https://www.cs.bu.edu/~goldbe/NTPattack.html
For anyone wondering about this and the other vulnerabilities that were recently fixed in ntpd, I think none of them are in chronyd. Here are some comments. As a client, chronyd does supports KoD RATE packets and it sets the minimum polling interval, but it doesn't accept spoofed replies. Also, the source port is random since chrony-1.30, which would make the attack more difficult. As a server, chronyd doesn't support rate limiting or KoD RATE. As for the clock stepping issue, chronyd by default doesn't do any steps from network, only the makestep and initstepslew directives allow that. The makestep directive works as described, it allows the clock to be stepped only in the number of updates that was specified. Allowing chronyd to always step using the -1 limit is not recommended. If you know your clock can't be wildly off after start, it's recommended to not use makestep at all. At worst, a MITM attacker can speed up or slow down your clock by 10%. -- Miroslav Lichvar -- To unsubscribe email chrony-users-requ...@chrony.tuxfamily.org with "unsubscribe" in the subject. For help email chrony-users-requ...@chrony.tuxfamily.org with "help" in the subject. Trouble? Email listmas...@chrony.tuxfamily.org.