Date: Wed, 27 Nov 2013 21:03:32 +0100 From: =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= <olivier@cochard.me> To: Cristiano Deana <cristiano.deana@gmail.com> Cc: "freebsd-current@freebsd.org" <freebsd-current@freebsd.org> Subject: Re: [request] ntp upgrade Message-ID: <CA%2Bq%2BTcryhgPk2Wjgwj3dzB31%2BxgfJ6Mh883zEOwNTuj0W9h4Tg@mail.gmail.com> In-Reply-To: <CAO82ECHMS-JUWC4TGwZpfU0opKE-2rOgW8RLOiR23RzVKgFJ3w@mail.gmail.com> References: <CAO82ECHMS-JUWC4TGwZpfU0opKE-2rOgW8RLOiR23RzVKgFJ3w@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 27, 2013 at 4:29 PM, Cristiano Deana <cristiano.deana@gmail.com> wrote: > Hi, > > is it possible to include in base system of the upcoming 10.0 the new > version of ntp (4.2.7 instead of 4.2.4)? > > There is a bug in older versions (< 4.2.7) who allows attacker use an ntp > server to DDoS. This has been corrected in new version: > https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks Thanks for this URL, I've meet this problem on my FreeBSD 9.2 few weeks ago (public NTP registered in the pool.ntp.org). There is a thread on the ntp.org ML about this too: http://lists.ntp.org/pipermail/pool/2013-November/thread.html Regards, Olivier
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2Bq%2BTcryhgPk2Wjgwj3dzB31%2BxgfJ6Mh883zEOwNTuj0W9h4Tg>