[ntp:security] [Bug 3043] Autokey association reset

bugzilla-daemon at ntp.org bugzilla-daemon at ntp.org
Sat May 7 09:22:14 UTC 2016


--- Comment #3 from Harlan Stenn <stenn at ntp.org> 2016-05-07 09:22:14 UTC ---
In a separate email, Miroslav wrote:

It seems there is also a problem with the peer_clear() call when
autokey is enabled on permanent associations. The association is not
demobilized with a spoofed crypto-NAK or packet with bad MAC, but the
state variables are reset in the peer_clear() call, which I think
allows a DoS attack preventing synchronization using that association.

Configure bugmail: http://bugs.ntp.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.

More information about the security mailing list