看板FB_security
標 題Re: NTP security hole CVE-2013-5211?
發信站NCTU CS FreeBSD Server (Sun Mar 16 15:21:28 2014)
轉信站ptt!csnews.cs.nctu!news.cednctu!FreeBSD.cs.nctu!.POSTED!freebsd.org!ow
In message <
[email protected]>, Julian Elischer writes:
>the best solution is to add a firewall stateful rule so that the ONLY
>port 123 udp packet that gets in is one that is a response to one you
>sent out first.
And to deny any packet which is too short:
deny udp from any to any dst-port 123 iplen 0-75
--
Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
[email protected] | TCP/IP since RFC 956
FreeBSD committer | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
_______________________________________________
[email protected] mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "
[email protected]"