Lucene search

K
suseSuseSUSE-SA:2014:001
HistoryJan 20, 2014 - 5:05 p.m.

DDoS reflection attacks in ntp

2014-01-2017:05:38
lists.opensuse.org
42

0.966 High

EPSS

Percentile

99.5%

The “monlist” command of the NTP protocol is currently abused in a DDoS reflection attack. This is done by spoofing packets from addresses to which the attack is directed to. The ntp installations itself are not target of the attack, but they are part of the DDoS network which the attacker is driving. It is therefore necessary to restrict ntp configurations to not answer spoofed “monlist” requests. It is not necessary to update the ntp software itself.

Solution

To ensure that your ntpd installation can not participate in a DDoS attack, add the following line to your configuration: restrict default noquery