[This is my final contribution to this topic since real time-nuts using NTP
run their own S1 servers driven by their Thunderbolts (et.seq.) and don't
need to worry about this]

On Sun, Oct 25, 2015 at 11:27 AM, Florian Teply <use...@teply.info> wrote:

> >
> > >But if I read that article on ars technica correctly, it looks like
> > >it is something inherent to the ntp protocol itself and the
> > >definitions it makes.
>

Only loosely.  It might appear that RFC5095 admits certain attacks using
the 'debug' interface however the 'source'* document says (referring to the
'nonce' check)

"While it seems reasonable to expect this check to be performed on the KoD
packet as well, RFC 5905 [41, Sec. 7.4] does not seem to explicitly require
this."

I believe this is an incorrect interpretation but in any case I think it's
clear the RFC is ambiguous and the published "fix" is to explicitly
validate the nonce.  Other fixes include completely disabling the 'debug'
interface. Implicit in this is the need to update the NTPv4 RFC.

I advise those concerned to read RFC5095, the BU paper* (don't worry about
the 68 references) and check the NTP security notice** to draw your own
conclusions about this problem keeping in mind Wojciech's recent comments.

*http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf
**http://support.ntp.org/bin/view/Main/SecurityNotice
_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to