NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p9was released on 21 November 2016. It addresses 1 high- (Windows only), 2 medum-, 2 medum-/low-, and 5 low-severity security issues, 28 bugfixes, and contains other improvements over 4.2.8p8.
Please see the NTP Security Notice for vulnerability and mitigation details.Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
ntpdis always started with the
-goption, which is common and against long-standing recommendation, and if at the moment
ntpdis restarted an attacker can immediately respond to enough requests from enough sources trusted by the target, which is difficult and not common, there is a window of opportunity where the attacker can cause
ntpdto set the time to an arbitrary value. Similarly, if an attacker is able to respond to enough requests from enough sources trusted by the target, the attacker can cause
ntpdto abort and restart, at which point it can tell the target to set the time to an arbitrary value if and only if
ntpdwas re-started against long-standing recommendation with the
-gflag, or if
ntpdwas not given the
-gflag, the attacker can move the target system's time by at most 900 seconds' time per attack.
NOTE WELL: The-- SueGraves - 2016-01-08
-gflag disables the limit check on the
ntpd, which is 900 seconds by default. The bug identified by the researchers at Boston University is that the
panic_gatecheck was only re-enabled after the first change to the system clock that was greater than 128 milliseconds, by default. The correct behavior is that the
panic_gatecheck should be re-enabled after any initial time correction. If an attacker is able to inject consistent but erroneous time responses to your systems via the network or "over the air", perhaps by spoofing radio, cellphone, or navigation satellite transmissions, they are in a great position to affect your system's clock. There comes a point where your very best defenses include:
ntpdto get time from multiple sources.
- Monitor your