Package: ntp
Severity: important
Tags: security

This was assigned CVE-2013-5211:
https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks
http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks

Upstream ripped out monlist in favour of mrulist:
http://bugs.ntp.org/show_bug.cgi?id=1531
http://bugs.ntp.org/show_bug.cgi?id=1532

The default configuration in Debian uses "noquery" and thus doesn't allow
monlist:

# By default, exchange time with everybody, but don't allow configuration.
restrict -4 default kod notrap nomodify nopeer noquery
restrict -6 default kod notrap nomodify nopeer noquery

For unstable we should update to 4.2.7. What's your suggesttion on this for 
stable? 

We could
- Provide 4.2.7 for stable-security (or backport the changes if not too
  intrusive)
- Ignore this for stable-security and offer 4.2.7 in backports.debian.org for
  those sites which run a public NTP server
- Ignore this altogether since it doesn't affect the standard configuration and
  operators of large public NTP servers most definitely have updated to 4.2.7
  already or deployed other workarounds.

Cheers,
        Moritz

_______________________________________________
Secure-testing-team mailing list
[email protected]
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/secure-testing-team

Reply via email to