Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 21 Mar 2014 00:50:28 +0000
From:      RW <rwmaillists@googlemail.com>
To:        freebsd-security@freebsd.org
Subject:   Re: NTP security hole CVE-2013-5211?
Message-ID:  <20140321005028.5c51faf4@gumby.homeunix.com>
In-Reply-To: <45647.1395351474@server1.tristatelogic.com>
References:  <742A1A10-15BF-433A-8693-CA2DD1DE0501@mac.com> <45647.1395351474@server1.tristatelogic.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 20 Mar 2014 14:37:54 -0700
Ronald F. Guilmette wrote:

> I resolved each of those three host names to _all_ of its associated
> IPv4 addresses.  This yielded me the following list:
> 
> 50.116.38.157
> ...
> 


It's a pool, if you try it a few minutes later you will probably get a
different 16 addresses. Depending on what precisely you are trying to
do, you probably need a stateful rule for outgoing connections.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140321005028.5c51faf4>