Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 16 Mar 2014 16:18:53 +0100
From:      =?utf-8?Q?=C5=81ukasz_Bromirski?= <lukasz@bromirski.net>
To:        freebsd-security@freebsd.org
Subject:   Re: freebsd-security Digest, Vol 478, Issue 3
Message-ID:  <DA901120-B24F-4830-BD66-007B7C975208@bromirski.net>
In-Reply-To: <mailman.73.1394971202.75583.freebsd-security@freebsd.org>
References:  <mailman.73.1394971202.75583.freebsd-security@freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help


On 16 Mar 2014, at 13:00, freebsd-security-request@freebsd.org wrote:

> Message: 3
> From: Julian Elischer <julian@freebsd.org>
> Subject: Re: NTP security hole CVE-2013-5211?
> Message-ID: <5323C244.8050101@freebsd.org>
> Content-Type: text/plain; charset="iso-8859-1"; Format="flowed"
> 
> the best solution is to add a firewall stateful rule so that the ONLY 
> port 123 udp packet that gets in is one that is a response to one you 
> sent out first.

No.

This is adding compexity to things which shouldn’t be complex.
Of course multiple of layers defend better than single one, but
not all FreeBSD boxes run with firewall turned on, and we shouldn’t
require people to have it on for ‘secure’ ntp operation.

/etc/ntp.conf should by default have secure posture and shouldn’t
require any additional firewalling to remain so.

-- 
"There's no sense in being precise when |               Łukasz Bromirski
 you don't know what you're talking     |      jid:lbromirski@jabber.org
 about."               John von Neumann |    http://lukasz.bromirski.net


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?DA901120-B24F-4830-BD66-007B7C975208>