Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 13 Jan 2014 11:08:46 +0100
From:      Cristiano Deana <cristiano.deana@gmail.com>
To:        Xin LI <d@delphij.net>
Cc:        freebsd-security@freebsd.org, Palle Girgensohn <girgen@freebsd.org>
Subject:   Re: NTP security hole CVE-2013-5211?
Message-ID:  <CAO82ECEsS-rKq7A-9w7VuxKpe_c_f=tvZQoRKgHEfi-yPdNeGQ@mail.gmail.com>
In-Reply-To: <52CF82C0.9040708@delphij.net>
References:  <B0F3AA0A-2D23-424B-8A79-817CD2EBB277@FreeBSD.org> <52CEAD69.6090000@grosbein.net> <81785015-5083-451C-AC0B-4333CE766618@FreeBSD.org> <52CF82C0.9040708@delphij.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jan 10, 2014 at 6:18 AM, Xin Li <delphij@delphij.net> wrote:

Hi,

We will have an advisory next week.  If a NTP server is properly
> configured, it's likely that they are not affected
>

I had this problem in november, and ask to -current to integrate the new
versione of ntpd in base (see my mail "[request] ntp upgrade" 11/27/13
http://lists.freebsd.org/pipermail/freebsd-current/2013-November/046822.html
).
I tried several workaround with config and policy, and ended up you MUST
have 4.2.7 to stop these kind of attacks.

I think it's better to upgrade the version in base AND to write a security
advisory.

Thank you

-- 
Cris, member of G.U.F.I
Italian FreeBSD User Group
http://www.gufi.org/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAO82ECEsS-rKq7A-9w7VuxKpe_c_f=tvZQoRKgHEfi-yPdNeGQ>