Хабр Курсы для всех
РЕКЛАМА
Практикум, Хекслет, SkyPro, авторские курсы — собрали всех и попросили скидки. Осталось выбрать!
учитывая, что его адрес знаю только я (как мне казалось).
restrict 127.0.0.1 (аналогично для ipv6).
restrict default ignore
restrict 127.0.0.1
Здравствуйте, Денис!
В адрес Вашего сервера поступила жалоба:
We have received spam/abuse notification from certbund@bsi.bund.de.
Please take the necessary steps to prevent this from happening again in future.
Furthermore, we would request that you provide both ourselves and the person who has submitted this complaint with a short statement within 24 hours. This statement should include details of the events leading up to the incident and the steps you are taking to deal with it.
Various blog posts have been reporting on a new way of NTP server misuse
and abuse. This abusive use can cause a more reflected and intense
denial-of-service attack to be performed.
An update to Version 4.2.7 or higher is recommended. Amplifier is the term
given to an attack based on the ratio of a small request (1 UDP package)
to a very large reply (max. 600 IP addresses). The feature has been actively
exploited for DDoS attacks since December 2013.
Information regarding the vulnerability with reference to your products
is available from Meinberg, HP and Juniper.
If an update to Version 4.2.7 or higher is not possible, the option «noquery»
can be set in the configuration file which takes effect once the service is
restarted and prevents the request from being processed.
As the German authority responsible for IT security, the BSI has obtained
details of German NTP server IP addresses.
We are offering you these details for your IP address area. You have the
possibility of using the enclosed details to inform your customers.
The log data shows the following data fields:
— ASNno: added based on IP address via Cymru's services
— IP: ip v4 address at the time of the timestamp, which responded to the
vulnerable NTP request
— Timestamp: the date and time of the request
— Country/gTLD: added via geoip databases
— ASNname: added based on IP address via Cymru's services
— Port: is 123 for the UDP transport protocol, UDP is not given but implied
Further information:
[1] Short Info CB-K14/0020 Update 2 — NTP: Misuse of monlist command enables
denial-of-service attack
www.cert-bund.de/advisoryshort/CB-K14-0020%20UPDATE%202
[2] DRDoS / Amplification Attack using ntpdc monlist command
support.ntp.org/bin/view/Main/SecurityNotice#DRDoS_Amplification_Attack_using
[3] Understanding and mitigating NTP-based DDoS attacks
blog.cloudflare.com/understanding-and-mitigating-ntp-based-ddos-attacks
[4] DDoS via NTP-Reflection (deutsch)
www.cert.at/services/blog/20140108163933-1003.html
[5] Vulnerability Summary for CVE-2013-5211
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5211
[6] NTP can be abused to amplify denial-of-service attack traffic
www.kb.cert.org/vuls/id/348126
[7] Secure NTP Template
www.team-cymru.org/ReadingRoom/Templates/secure-ntp-template.html
— Kind regards from Team CERT-Bund
Просьба проверить выше изложенный материал, разобраться в проблеме и сообщить нам о принятых действиях.
Мы ждем Вашего ответа в течение 12 часов.
C уважением, специалист службы поддержки FastVPS LLC
Дмитрий Скаленко
Атака с помощью вашего сервера времени: NTP amplification attack (CVE-2013-5211)