NTP BUG 2946: Origin Leak: ntpq and ntpdc Disclose Origin Timestamp to Unauthenticated Clients
Last update: June 28, 2022 20:06 UTC (57417e17c)
Summary
Description
To prevent off-path attackers from impersonating legitimate peers, clients require that the origin timestamp in a received response packet match the transmit timestamp from its last request to a given peer. Under assumption that only the recipient of the request packet will know the value of the transmit timestamp, this prevents an attacker from forging replies.
Mitigation
- Configure
ntpd
to get time from multiple sources.
- Configure
ntpd
with restrict
statements to limit who is allowed to issue ntpq
and ntpdc
queries. Note that ntpdc
queries are disabled by default.
- Monitor your
ntpd
instances.
Credit
This weakness was discovered by Matthew Van Gundy of Cisco ASIG.
Timeline