Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <4DEA83BF-D7C9-40F2-AD63-BC9C9B3910AE@hojmark.org>
Date: Fri, 29 Jan 2016 08:33:52 +0100
From: Asbjorn Hojmark <lists@...mark.org>
To: Ask Bjørn Hansen <ask@...pool.org>
Cc: Luca BRUNO <lucab@...ian.org>,
 oss-security@...ts.openwall.com,
 pool@...ts.ntp.org,
 team@...urity.debian.org,
 secalert@...hat.com
Subject: Re: [Pool] shodan.io actively infiltrating ntp.org IPv6 pools for scanning purposes


> I might just be too cynical, but it also feels like something we should come to expect. Anyone who's looked at traffic to an Internet facing IPv4 address have seen much worse.

I (too) might just be too cynical, or in this business too long, but I feel that if you communicate on the global Internet, you should expect to be probed. If you’re not ready to be probed, your machine shouldn’t be on the Net. Really.

One can probe the entire v4 Internet in minutes, so being probed should not be new to any device on it. The fact that the v6 address space takes ... slightly longer ;) to probe should not make one lazy and rely on security by obscurity, hoping that your machine will not be seen.

That being said, I do agree that the NTP pool should try to only provide the services that it ‘advertises’. I just hope everyone realises that with volounteers running the servers and the pool, that will be very difficult to enforce.

-A

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.