[time-nuts] When NTP goes wrong...
phk at phk.freebsd.dk
Sun Oct 25 17:43:23 EDT 2015
In message <CAK9pY-xZiTg0pL-bb0FzhyWqF_GjBEvbDwdM=W3LfPrgGwqruw at mail.gmail.com>
, Neil Schroeder writes:
>I would like to respond in a generic and sweeping way - having not read in
>the detail Bob layed out for us required to fully analyze the situation -
>to the notion that circuit level access or prior topological knowledge is
>required to exploit this or any other spoofing attack.
This is where it would really be helpful if people read the paper,
because they spend considerable text sorting through what requires
you to be in-band and what doesn't.
Poul-Henning Kamp | UNIX since Zilog Zeus 3.20
phk at FreeBSD.ORG | TCP/IP since RFC 956
FreeBSD committer | BSD since 4.3-tahoe
Never attribute to malice what can adequately be explained by incompetence.
More information about the time-nuts