How is that relevant? 4.2.6 is not exploitable, if you have the correct
configuration.
On 3/17/2014 2:15 AM, David J Taylor wrote:
From: Brian Rak
To hijack this a bit (before the BCP38 arguments start): is there any
way for us as a service provider to ensure that our NTP servers are
returned to clients connecting from our ASN? Is this something that
makes sense?
[]
=================================
You are running a recent version on NTP, I suppose? NTP 4.2.7p26 or
later?
http://support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using
David
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool