On 2014-01-15, David Woolley wrote:

> On 27/12/13 10:24, Rob wrote:
>
>> There are more and more amplification attacks against ntp servers,
>> similar to those against open DNS resolvers. A small packet sent with
>> a spoofed source address (allowed by a lame ISP) results in a large
>> reply from ntpd, sent to the victim of the attack.
>
> CERT have just issued an alert about the monlist attack:
><https://www.us-cert.gov/ncas/alerts/TA14-013A> (TA14-013A: NTP
>Amplification Attacks Using CVE-2013-5211). The advice is upgrade or
>use restrict.

Upgrade _or_ use noquery _or_ disable monitor

Information at http://support.ntp.org/security

-- 
Steve Kostecke <koste...@ntp.org>
NTP Public Services Project - http://support.ntp.org/

_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to