Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 24 Mar 2014 11:02:08 -0400
From:      Gary Palmer <gpalmer@freebsd.org>
To:        Brett Glass <brett@lariat.org>
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>, Remko Lodder <remko@freebsd.org>, "Ronald F. Guilmette" <rfg@tristatelogic.com>
Subject:   Re: NTP security hole CVE-2013-5211?
Message-ID:  <20140324150208.GA5238@in-addr.com>
In-Reply-To: <201403220013.SAA15675@mail.lariat.net>
References:  <51381.1395429637@server1.tristatelogic.com> <8F3083F1-3A20-4FEC-9969-F9968D87569E@FreeBSD.org> <201403220013.SAA15675@mail.lariat.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Mar 21, 2014 at 06:13:10PM -0600, Brett Glass wrote:
> At 03:28 PM 3/21/2014, Remko Lodder wrote:
> 
> >Ofcourse the software should be well protected as well, and secteam@ did his
> >best to offer the best solution possible. Though as mentioned by Brett for
> >example we just cannot force the update of ntpd.conf on user machines because
> >every admin could have legitimate reasons for having a configuration in place
> >they decided to have. It's risky to change those things and especially enforce
> >them on running machines. Most of his ideas were in the advisory already
> >except for the 'disable monitor' part, which might be reason to discuss
> >whether that makes sense or not.
> 
> I've suggested one other thing, and still think it would be a good idea to
> thwart attacks: that we compile ntpd to source outgoing queries from randomly
> selected ephemeral UDP ports rather than UDP port 123. (This was, 
> in fact, done
> in earlier releases of FreeBSD and I'm unsure why it was changed.) This makes
> stateful firewalling less necessary and improves its performance if it is done.


Could you please explain how randomising the source port of NTP queries
would thwart NTP monitor amplification attacks?  The attack works because
the NTP control port on the server is always UDP/123, and I don't see how
changing the source port would fix that.  Unless I'm missing something, you'd
need to change the port the daemon accepts queries on, not the port it sources
outbound queries on.

Thanks,

Gary



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140324150208.GA5238>