Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 22 Dec 2014 19:14:34 +0000
From:      "Poul-Henning Kamp" <phk@phk.freebsd.dk>
To:        jungle Boogie <jungleboogie0@gmail.com>
Cc:        freebsd-security@freebsd.org
Subject:   Re: ntpd vulnerabilities
Message-ID:  <22953.1419275674@critter.freebsd.dk>
In-Reply-To: <CAKE2PDvvtHWYkN%2B4O0us%2BNc227mYVJMz=_DeHR14VRRYgETfhA@mail.gmail.com>
References:  <252350272.1812596.1419241828431.JavaMail.zimbra@cleverbridge.com> <B6AF154A-FE22-4357-9031-91D661FD7E57@localhost.lu> <F7FACD2F-3AFE-4717-B4B9-B54A6FC70458@localhost.lu> <201412221745.KAA28186@mail.lariat.net> <1419274938.916478.205831685.0E7433EA@webmail.messagingengine.com> <CAKE2PDvvtHWYkN%2B4O0us%2BNc227mYVJMz=_DeHR14VRRYgETfhA@mail.gmail.com>

next in thread | previous in thread | raw e-mail | index | archive | help
--------
In message <CAKE2PDvvtHWYkN+4O0us+Nc227mYVJMz=3D_DeHR14VRRYgETfhA@mail.gma=
il.com>
, jungle Boogie writes:

>Would you say a MITM attack is similar to a forged ntp reply?
>
>If so, have you seen this:
>http://quigon.bsws.de/papers/opencon04/ntpd/mgp00018.html

While that does make it harder to spoof NTP packets "blind", it
does *nothing* for MITM resistance.

-- =

Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    =

Never attribute to malice what can adequately be explained by incompetence=
.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?22953.1419275674>