Date: Fri, 21 Mar 2014 00:50:28 +0000 From: RW <rwmaillists@googlemail.com> To: freebsd-security@freebsd.org Subject: Re: NTP security hole CVE-2013-5211? Message-ID: <20140321005028.5c51faf4@gumby.homeunix.com> In-Reply-To: <45647.1395351474@server1.tristatelogic.com> References: <742A1A10-15BF-433A-8693-CA2DD1DE0501@mac.com> <45647.1395351474@server1.tristatelogic.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 20 Mar 2014 14:37:54 -0700 Ronald F. Guilmette wrote: > I resolved each of those three host names to _all_ of its associated > IPv4 addresses. This yielded me the following list: > > 50.116.38.157 > ... > It's a pool, if you try it a few minutes later you will probably get a different 16 addresses. Depending on what precisely you are trying to do, you probably need a stateful rule for outgoing connections.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20140321005028.5c51faf4>