Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 27 Nov 2013 21:03:32 +0100
From:      =?ISO-8859-1?Q?Olivier_Cochard=2DLabb=E9?= <olivier@cochard.me>
To:        Cristiano Deana <cristiano.deana@gmail.com>
Cc:        "freebsd-current@freebsd.org" <freebsd-current@freebsd.org>
Subject:   Re: [request] ntp upgrade
Message-ID:  <CA%2Bq%2BTcryhgPk2Wjgwj3dzB31%2BxgfJ6Mh883zEOwNTuj0W9h4Tg@mail.gmail.com>
In-Reply-To: <CAO82ECHMS-JUWC4TGwZpfU0opKE-2rOgW8RLOiR23RzVKgFJ3w@mail.gmail.com>
References:  <CAO82ECHMS-JUWC4TGwZpfU0opKE-2rOgW8RLOiR23RzVKgFJ3w@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, Nov 27, 2013 at 4:29 PM, Cristiano Deana
<cristiano.deana@gmail.com> wrote:
> Hi,
>
> is it possible to include in base system of the upcoming 10.0 the new
> version of ntp (4.2.7 instead of 4.2.4)?
>
> There is a bug in older versions (< 4.2.7) who allows attacker use an ntp
> server to DDoS. This has been corrected in new version:
> https://cert.litnet.lt/en/docs/ntp-distributed-reflection-dos-attacks

Thanks for this URL, I've meet this problem on my FreeBSD 9.2 few
weeks ago (public NTP registered in the pool.ntp.org).

There is a thread on the ntp.org ML about this too:
http://lists.ntp.org/pipermail/pool/2013-November/thread.html

Regards,

Olivier



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CA%2Bq%2BTcryhgPk2Wjgwj3dzB31%2BxgfJ6Mh883zEOwNTuj0W9h4Tg>