This week a new attack on the Network Time Protocol Daemon (ntpd) was demonstrated, see this paper. This could potentially wreak havoc with my HTTPS website or other time sensitive services I am running.
According to the article, to remain safe, clients and servers alike should run at least NTP version 4.2.8p4.
Running ntpd --version
on my Ubuntu Server 14.04.3 LTS machine gives me ntpd 4.2.6p5
which is still vulnerable. This is even after running apt-get update
, apt-get upgrade
and apt-get dist-upgrade
.
Apparently I can download the latest version from ntp.org myself. But I am unsure if this will conflict with my existing ntpd install done via apt-get
. Also they only offer the download via HTTP and their method of ensuring authenticity is by using an MD5 hash checksum... I am looking forward to my NSA backdoored patch. I really wish people would use GPG signatures.
Does Ubuntu plan to release a security patch to upgrade ntpd to 4.2.8p4 any time soon? What will be needed to get the fix?
If I read the code and assumed the 4.2.8p4 version available for download on the ntp.org website was trustworthy, how can I install that without conflicts?
wget http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-4.2.8p4.tar.gz
&&tar xvfz ntp-4.2.8p4.tar.gz
&&cd ntp-4.2.8p4/
&&./configure
&&make
&&make install
. Thenntpd --version
which showed the new versionntpd 4.2.8p4
. – Rex Oct 31 '15 at 01:04