From owner-freebsd-security@FreeBSD.ORG Thu Jan 16 09:41:26 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id E87B642E for ; Thu, 16 Jan 2014 09:41:26 +0000 (UTC) Received: from batman.home4u.ch (batman.home4u.ch [IPv6:2001:8a8:1005:1::2]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 7256B1246 for ; Thu, 16 Jan 2014 09:41:26 +0000 (UTC) X-Virus-Scanned: amavisd-new at home4u.ch Received: from colossus.wenks.ch (fabian@colossus.wenks.ch [IPv6:2001:8a8:1005:4:223:32ff:fe98:2d72]) (authenticated bits=0) by batman.home4u.ch (8.14.5/8.14.5) with ESMTP id s0G9fOMU095356 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=NO) for ; Thu, 16 Jan 2014 10:41:24 +0100 (CET) (envelope-from fabian@wenks.ch) Message-ID: <52D7A944.70604@wenks.ch> Date: Thu, 16 Jan 2014 10:41:24 +0100 From: Fabian Wenk User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:24.0) Gecko/20100101 Thunderbird/24.2.0 MIME-Version: 1.0 To: freebsd-security@freebsd.org Subject: Re: NTP security hole CVE-2013-5211? References: <52CEAD69.6090000@grosbein.net> <81785015-5083-451C-AC0B-4333CE766618@FreeBSD.org> <52CF82C0.9040708@delphij.net> <86d2jud85v.fsf@nine.des.no> In-Reply-To: <86d2jud85v.fsf@nine.des.no> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.17 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 16 Jan 2014 09:41:27 -0000 Hello Dag-Erling On 14.01.2014 14:06, Dag-Erling Smørgrav wrote: > Cristiano Deana writes: >> I tried several workaround with config and policy, and ended up you MUST >> have 4.2.7 to stop these kind of attacks. > > Doesn't "restrict noquery" block monlist in 4.2.6? It does at least in 4.2.4p8 (running on FreeBSD 9.1), so I guess this should also work in newer versions. bye Fabian