On Wed, Dec 24, 2014 at 05:42:16PM +0100, Andrei wrote: > On Wed, 24 Dec 2014 00:33:09 +0100 (CET) > FreeBSD Security Advisories <security-advisor...@freebsd.org> wrote: > > > No workaround is available, but systems not running ntpd(8) are not > > affected. Because the issue may lead to remote root compromise, the > > FreeBSD Security Team recommends system administrators to firewall NTP > > ports, namely tcp/123 and udp/123 when it is not clear that all > > systems have been patched or have ntpd(8) stopped. > > Why tcp/123? >
gjb@nucleus:~ % grep -i ^ntp /etc/services ntp 123/tcp #Network Time Protocol ntp 123/udp #Network Time Protocol Glen
pgpIRMpW2z7Rm.pgp
Description: PGP signature