Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 13 Apr 2001 10:48:59 -0700
From:      "Crist Clark" <crist.clark@globalstar.com>
To:        Drew Derbyshire <software@kew.com>
Cc:        Steve Reid <sreid@sea-to-sky.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-01:31.ntpd
Message-ID:  <3AD73C0B.6ED45D83@globalstar.com>
References:  <200104122058.f3CKwLe45352@freefall.freebsd.org> <20010413000659.A88148@grok.bc.hsia.telus.net> <004601c0c412$4ea81e70$94cba8c0@hh.kew.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Drew Derbyshire wrote:
> 
> From: "Steve Reid" <sreid@sea-to-sky.net>
> > None of the advisories I've seen released (FreeBSD or otherwise) have
> > listed "restrict" directives in ntp.conf as a workaround. Is this
> > because it is not sufficient, or are the people writing the advisories
> > not aware of it, or other?
> 
> > Restricting by address is subject to spoofing of course,
> 
> IMHO ... I believe the comment in the advisory that specifically points out
> spoofing is a problem is why restrict is not listed as workaround.  The
> official workarounds have to be bulletproof.

For machines working only as an NTP "client," you can enter a 'noquery'
restrict statement for all machines,

  restrict default ignore
  restrict <ntp server1> noquery
  restrict <ntp server2> noquery
  ...
  restrict 127.0.0.1 noquery

Including the servers it queries and localhost. The machine can still 
sync to the servers (YMMV), and it is safe from this specific 
vulnerability. Spoofing does not enter into the picture.

(Note: Putting 'noquery' on the loopback might be a problem for xntpd,
but I have not noticed problems for ntpd.)
-- 
Crist J. Clark                                Network Security Engineer
crist.clark@globalstar.com                    Globalstar, L.P.
(408) 933-4387                                FAX: (408) 933-4926

The information contained in this e-mail message is confidential,
intended only for the use of the individual or entity named above.  If
the reader of this e-mail is not the intended recipient, or the employee
or agent responsible to deliver it to the intended recipient, you are
hereby notified that any review, dissemination, distribution or copying
of this communication is strictly prohibited.  If you have received this
e-mail in error, please contact postmaster@globalstar.com

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3AD73C0B.6ED45D83>