Date: Thu, 20 Mar 2014 22:20:52 -0600 From: Brett Glass <brett@lariat.org> To: "Ronald F. Guilmette" <rfg@tristatelogic.com> Cc: freebsd-security@freebsd.org Subject: Re: NTP security hole CVE-2013-5211? Message-ID: <201403210421.WAA05406@mail.lariat.net>
next in thread | raw e-mail | index | archive | help
At 03:37 PM 3/20/2014, Ronald F. Guilmette wrote: >Starting from these lines in my /etc/ntp.conf file: > >server 0.freebsd.pool.ntp.org iburst >server 1.freebsd.pool.ntp.org iburst >server 2.freebsd.pool.ntp.org iburst > >I resolved each of those three host names to _all_ of its associated >IPv4 addresses. This yielded me the following list: > >50.116.38.157 >69.50.219.51 >69.55.54.17 >69.167.160.102 >108.61.73.244 >129.250.35.251 >149.20.68.17 >169.229.70.183 >192.241.167.38 >199.7.177.206 >209.114.111.1 >209.118.204.201 [Snip] All of this is good. However, remember that anyone who can spoof IPs will know that the above addresses are the defaults for any FreeBSD machine and can take advantage of these "holes" in your firewall. --Brett Glass
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201403210421.WAA05406>