[ntpsec commit] Update SHM and DDoS

Hal Murray murray at ntpsec.org
Sun Oct 4 21:38:45 UTC 2015


Module:    ntpsec
Branch:    master
Commit:    1536951ae1dff4f8323366fb181e69be3c354362
Changeset: http://git.ntpsec.org/ntpsec/commit/?id=1536951ae1dff4f8323366fb181e69be3c354362

Author:    Hal Murray <hmurray at megapathdsl.net>
Date:      Sun Oct  4 14:37:59 2015 -0700

Update SHM and DDoS

---

 devel-docs/TODO | 11 +++++++----
 1 file changed, 7 insertions(+), 4 deletions(-)

diff --git a/devel-docs/TODO b/devel-docs/TODO
index 4742a20..625b700 100644
--- a/devel-docs/TODO
+++ b/devel-docs/TODO
@@ -35,6 +35,9 @@ None right now. (Sep-22 2015)
 * We need a build time option to disable all dangerous operations
   that ntpq can produce.
 
+* Make sure we do the right thing with KoD and rate limiting.
+  (Forged requests can use rate limiting to block service to a site.)
+
 
 === Porting ===
 
@@ -127,10 +130,6 @@ is not yet tested anywhere but in ntpd itself.
   should be split out.  3 examples: Autokey, contents of log files,
   multicast/broadcase/manycast.
 
-* We need a page on security/DDos issues encountered by NTP, both
-  as applied to attacking our system and using our system to attack
-  other systems.
-
 
 === Remaining procedural issues ===
 
@@ -161,6 +160,10 @@ is not yet tested anywhere but in ntpd itself.
   one, the /etc/resolv.conf reload, would be better handled under Linux
   by asynchronous file-change notifications.
 
+* Take another look at SHM.  I think we can make a version that is
+  read-only and solid.  Maybe write a support package that does all the
+  work if you call it with the date/time.
+
 Hal:
 > I think there is some interaction between when the ACTS driver calls and the 
 > state of other stuff, like the connection to the net.  This is probably a 



More information about the vc mailing list