![]() |
Open NTP Vulnerability letter
I received this yesterday, is it a generic letter they are sending out to everyone or are they targetting people identified as having this vulnerability?
I went to the website mentioned in the letter openntpproject.org but still really have no clue what it is I'm supposed to do :( |
Re: Open NTP Vulnerability letter
Quote:
off and never had another letter. |
Re: Open NTP Vulnerability letter
it is nice that VM are being proactive in their network security but I think they are digging themselves a hole.
https://www.cableforum.co.uk/images/...2014/08/10.jpg The website they ask you to go to isn't particularly user friendly and they are sort of scaring customers into going to PC World (who are useless) and paying money to get it fixed. |
Re: Open NTP Vulnerability letter
I have a Synology NAS and in the firewall settings for that I found an option to disable NTP Service on port 123 which I've now done.
I'm assuming this is what Virgin were referring to (or at least I hope so) and no I wouldn't go near the numpties at PC World to sort something like this out they wouldn't have a clue :) |
Re: Open NTP Vulnerability letter
I would love to walk in and do a survey and see if any of them actually know what ntp is.
|
Re: Open NTP Vulnerability letter
I assume this is sent out with the recent NTP amplification attack which generated around 400 Gbps traffic :shocked:
|
Re: Open NTP Vulnerability letter
lol, you just cant imagine having that amount of bandwidth at your fingertips.
|
Re: Open NTP Vulnerability letter
It's really not that exciting.
|
Re: Open NTP Vulnerability letter
Quote:
Synology (Amazon cloudfront CDN)website appears temporarily unavailable but worth checking release notes as NTP vulnerability is one of many if you're not up-to-date! |
Re: Open NTP Vulnerability letter
Quote:
|
Re: Open NTP Vulnerability letter
Are they sending out to everyone who just has an NTP server public facing or only the ones that are actually vulnerable to the monlist type issues? It's the initial question asked in this thread but still no answered and would help everyone to know the answer.
|
Re: Open NTP Vulnerability letter
the way the VM letter is worded it sounds like they have done a port scan and/or other tests and have only sent the letter out to those who are vulnerable.
|
Re: Open NTP Vulnerability letter
Quote:
|
Re: Open NTP Vulnerability letter
Quote:
DSM5 should already be corrected[**], so unless VM checked prior to March then you shouldn't be causing the problem from the Synology ntp server anyway[*]? Quote:
[**] I SSH'd into my DSM5.0.4493-4 and checked ntpdc "monlist" which reassuringly didn't respond. However I note the build was compiled 29May2014 so perhaps if VM ran a check for open NTP servers prior to any DSM5 June build it might have flagged it? |
| All times are GMT +1. The time now is 01:22. |
Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2026, vBulletin Solutions Inc.
All Posts and Content are © Cable Forum