From owner-freebsd-security@FreeBSD.ORG Tue Dec 23 13:18:44 2014 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 593792D1 for ; Tue, 23 Dec 2014 13:18:44 +0000 (UTC) Received: from smtp.des.no (smtp.des.no [194.63.250.102]) by mx1.freebsd.org (Postfix) with ESMTP id 1711D649C9 for ; Tue, 23 Dec 2014 13:18:43 +0000 (UTC) Received: from nine.des.no (smtp.des.no [194.63.250.102]) by smtp-int.des.no (Postfix) with ESMTP id 73AEE9673; Tue, 23 Dec 2014 13:18:34 +0000 (UTC) Received: by nine.des.no (Postfix, from userid 1001) id CF6234A9F; Tue, 23 Dec 2014 14:18:25 +0100 (CET) From: =?utf-8?Q?Dag-Erling_Sm=C3=B8rgrav?= To: Joe Malcolm Subject: Re: ntpd vulnerabilities References: <252350272.1812596.1419241828431.JavaMail.zimbra@cleverbridge.com> <86a92fzmls.fsf@nine.des.no> <21656.46224.764659.252388@neoshoggoth.uraeus.com> <86sig6yd63.fsf@nine.des.no> <21657.26902.156000.609968@neoshoggoth.uraeus.com> Date: Tue, 23 Dec 2014 14:18:25 +0100 In-Reply-To: <21657.26902.156000.609968@neoshoggoth.uraeus.com> (Joe Malcolm's message of "Tue, 23 Dec 2014 13:07:34 +0000") Message-ID: <86oaquy066.fsf@nine.des.no> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.4 (berkeley-unix) MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Cc: freebsd-security@freebsd.org, Robert Simmons , Winfried Neessen X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 23 Dec 2014 13:18:44 -0000 Joe Malcolm writes: > Dag-Erling Sm=C3=B8rgrav writes: > > These work on a "last match" basis. The latter three lines lift all > > restrictions for localhost, so you can still "ntpq -pn" your own > > server, but nobody else can. > Thanks. So, if I understand correctly, the shipped config is > vulnerable to local (same-host) attackers, not remote ones. Broadly, yes. Restricting requests from localhost makes it impossible to monitor your own server, because ntpdc and ntpq talk to ntpd over UDP to localhost rather than a Unix socket, which could be protected by file permissions. Implementing a Unix socket for ntpdc / ntpq is left as an exercise to the reader. DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no