Date: Mon, 22 Dec 2014 19:14:34 +0000 From: "Poul-Henning Kamp" <phk@phk.freebsd.dk> To: jungle Boogie <jungleboogie0@gmail.com> Cc: freebsd-security@freebsd.org Subject: Re: ntpd vulnerabilities Message-ID: <22953.1419275674@critter.freebsd.dk> In-Reply-To: <CAKE2PDvvtHWYkN%2B4O0us%2BNc227mYVJMz=_DeHR14VRRYgETfhA@mail.gmail.com> References: <252350272.1812596.1419241828431.JavaMail.zimbra@cleverbridge.com> <B6AF154A-FE22-4357-9031-91D661FD7E57@localhost.lu> <F7FACD2F-3AFE-4717-B4B9-B54A6FC70458@localhost.lu> <201412221745.KAA28186@mail.lariat.net> <1419274938.916478.205831685.0E7433EA@webmail.messagingengine.com> <CAKE2PDvvtHWYkN%2B4O0us%2BNc227mYVJMz=_DeHR14VRRYgETfhA@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
-------- In message <CAKE2PDvvtHWYkN+4O0us+Nc227mYVJMz=3D_DeHR14VRRYgETfhA@mail.gma= il.com> , jungle Boogie writes: >Would you say a MITM attack is similar to a forged ntp reply? > >If so, have you seen this: >http://quigon.bsws.de/papers/opencon04/ntpd/mgp00018.html While that does make it harder to spoof NTP packets "blind", it does *nothing* for MITM resistance. -- = Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe = Never attribute to malice what can adequately be explained by incompetence= .
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?22953.1419275674>