[ntp:security] [Bug 2978] Interleave

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Fri Apr 29 13:07:05 UTC 2016


https://bugs.ntp.org/show_bug.cgi?id=2978

--- Comment #4 from Miroslav Lichvar <mlichvar at redhat.com> 2016-04-29 13:07:05 UTC ---
Created attachment 1403
  --> https://bugs.ntp.org/attachment.cgi?id=1403
Don't allow spoofed packet to enable symmetric interleaved mode

Here is a patch that randomizes the fraction part of the reference timestamp to
not reveal the receive timestamp to other NTP clients and servers. Also, the
interleaved mode can't be enabled in the client/server mode and authentication
is required if enabled.

-- 
Configure bugmail: https://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.


More information about the security mailing list