[OpenIndiana-discuss] Avoiding the NTP amplification exploit
Gary Mills
gary_mills at fastmail.fm
Wed Feb 12 15:40:40 UTC 2014
On Wed, Feb 12, 2014 at 02:48:20PM +0000, Saso Kiselkov wrote:
> On 2/12/14, 2:43 PM, Gary Mills wrote:
> > For those who haven't already heard about this NTP exploit, it begins
> > with a single UDP packet sent to a computer running the NTP service.
> > With the default configuration, a monlist query will result in many
> > packets being returned to the source of the query. All it takes is a
> > spoofed source address to turn this into a DOS attack. You can read
> > about it here:
> >
> > http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks
> >
> > The solution is here:
> >
> > http://support.ntp.org/bin/view/Support/AccessRestrictions
> >
> > I'm attaching the changes I made to my ntp.conf to avoid this problem.
>
> Prudent advice, yes, but I can't think of any situation where an openly
> accessible NTP service on an Internet-facing machine that isn't
> *specifically* configured to be an NTP server isn't a case of bad admin
> negligence. *All* Internet-facing machines should be running ipfilters
> and only open up ports for the services they are designed to provide.
This is curious. The Symantec article says to upgrade to version
4.2.7 to eliminate this exploit. I see that oi_151a9 runs version
4.2.7p411, which I assume is not vulnerable. My Solaris 11.1 desktop
only runs version 4.2.5p200, putting it behind the OI version. It
likely is vulnerable.
> Anyway, you're right on the changes to ntp.conf and I have to wonder why
> this wasn't the default in the ntp package to begin with.
Yes, the configuration could still be changed in OI to make the
service less visible externally.
--
-Gary Mills- -refurb- -Winnipeg, Manitoba, Canada-
More information about the OpenIndiana-discuss
mailing list