Thursday, January 16, 2014

Fw: NTP Amplification Attacks Using CVE-2013-5211 | US-CERT

Screen capture of this alert page.

If you are running NTP Daemon, remember to upgrade to Version 4.2.7, or just disable “monlist” functionality.


NTP Amplification Attacks Using CVE-2013-5211 | US-CERT

Overview

A Network Time Protocol (NTP) Amplification attack is an emerging form of Distributed Denial of Service (DDoS) that relies on the use of publically accessible NTP servers to overwhelm a victim system with UDP traffic.

I believe IT administrators should react immediately even if you run NTP Daemon only inside your corporate network. Any insider knows this caveat could make you in trouble easily.


How to disable "monlist"?
To disable “monlist” functionality on a public-facing NTP server that cannot be updated to 4.2.7, add the “noquery” directive to the “restrict default” line in the system’s ntp.conf, as shown below:

restrict default kod nomodify notrap nopeer noquery
restrict -6 default kod nomodify notrap nopeer noquery

Where to get updated NTP Daemon software?

NTP Download Page is here.

References

NTP Amplification Attacks Using CVE-2013-5211 | US-CERT
More videos on Show IP Protocols YouTube Channel.


No comments:

Post a Comment

Tip: you can also anonymously comment here.

Popular Posts