Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 24 Dec 2014 17:42:16 +0100
From:      Andrei <az@azsupport.com>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-14:31.ntp
Message-ID:  <20141224174216.6fd47466@azsupport.com>
In-Reply-To: <20141223233310.098C54BB6@nine.des.no>
References:  <20141223233310.098C54BB6@nine.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 24 Dec 2014 00:33:09 +0100 (CET)
FreeBSD Security Advisories <security-advisories@freebsd.org> wrote:

> No workaround is available, but systems not running ntpd(8) are not
> affected.  Because the issue may lead to remote root compromise, the
> FreeBSD Security Team recommends system administrators to firewall NTP
> ports, namely tcp/123 and udp/123 when it is not clear that all
> systems have been patched or have ntpd(8) stopped.

Why tcp/123?

Kind regards,
Andrei.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20141224174216.6fd47466>