[169149] in North American Network Operators' Group
Re: OpenNTPProject.org
daemon@ATHENA.MIT.EDU (Lyndon Nerenberg)
Sun Feb 16 23:09:30 2014
From: Lyndon Nerenberg <lyndon@orthanc.ca>
Date: Sun, 16 Feb 2014 20:09:01 -0800
To: NANOG List <nanog@nanog.org>
In-Reply-To: <201402170559.43562.mark.tinka@seacom.mu>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--Apple-Mail=_1748BFCE-257A-43AD-BDCA-9F2879D23505
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
charset=us-ascii
On Feb 16, 2014, at 7:59 PM, Mark Tinka <mark.tinka@seacom.mu> wrote:
> Juniper's Junos implementation (which is based on FreeBSD)=20
> hasn't been patched
>=20
> Using firewall filters is the only way to mitigate the=20
> vulnerability.
But doesn't the JunOS ntpd read/parse ntpd.conf? It's worth getting to =
the admin mode shell prompt and taking a poke around /etc.
--Apple-Mail=_1748BFCE-257A-43AD-BDCA-9F2879D23505
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
filename=signature.asc
Content-Type: application/pgp-signature;
name=signature.asc
Content-Description: Message signed with OpenPGP using GPGMail
-----BEGIN PGP SIGNATURE-----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=Lh1D
-----END PGP SIGNATURE-----
--Apple-Mail=_1748BFCE-257A-43AD-BDCA-9F2879D23505--