Date: Mon, 13 Jan 2014 11:08:46 +0100 From: Cristiano Deana <cristiano.deana@gmail.com> To: Xin LI <d@delphij.net> Cc: freebsd-security@freebsd.org, Palle Girgensohn <girgen@freebsd.org> Subject: Re: NTP security hole CVE-2013-5211? Message-ID: <CAO82ECEsS-rKq7A-9w7VuxKpe_c_f=tvZQoRKgHEfi-yPdNeGQ@mail.gmail.com> In-Reply-To: <52CF82C0.9040708@delphij.net> References: <B0F3AA0A-2D23-424B-8A79-817CD2EBB277@FreeBSD.org> <52CEAD69.6090000@grosbein.net> <81785015-5083-451C-AC0B-4333CE766618@FreeBSD.org> <52CF82C0.9040708@delphij.net>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Jan 10, 2014 at 6:18 AM, Xin Li <delphij@delphij.net> wrote: Hi, We will have an advisory next week. If a NTP server is properly > configured, it's likely that they are not affected > I had this problem in november, and ask to -current to integrate the new versione of ntpd in base (see my mail "[request] ntp upgrade" 11/27/13 http://lists.freebsd.org/pipermail/freebsd-current/2013-November/046822.html ). I tried several workaround with config and policy, and ended up you MUST have 4.2.7 to stop these kind of attacks. I think it's better to upgrade the version in base AND to write a security advisory. Thank you -- Cris, member of G.U.F.I Italian FreeBSD User Group http://www.gufi.org/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAO82ECEsS-rKq7A-9w7VuxKpe_c_f=tvZQoRKgHEfi-yPdNeGQ>