[ntp:security] [Bug 2672] New: ::1 can be spoofed. ACLs based on source IP can be bypassed

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Mon Nov 3 00:43:25 UTC 2014


             Bug #: 2672
           Summary: ::1 can be spoofed.  ACLs based on source IP can be
           Product: ntp
           Version: 4.2.6
          Platform: N/A
        OS/Version: All
            Status: CONFIRMED
          Severity: critical
          Priority: P2
         Component: Security Bugs
        AssignedTo: stenn at ntp.org
        ReportedBy: stenn at ntp.org
                CC: security at ntp.org, stephen.roettger at gmail.com
            Blocks: 2655
             Group: Security
    Classification: Unclassified

Harlan Stenn <stenn at ntp.org> changed:

           What    |Removed                     |Added
              Flags|                            |blocking4.2.6+,
                   |                            |blocking4.2.8+

+++ This bug was initially created as a clone of Bug #2655 +++

8) Restrictions based on source IP can be bypassed

 fix: not sure if this is an issue that can be fixed reliably. Also
there are other access restrictions in place (symmetric keys). Checking
the source interface for "::1" packets could raise the bar.

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list