[LACNIC/Seguridad] IETF I-D sobre Aleatorizacion de puertos en NTP (Fwd: New Version Notification for draft-ietf-ntp-port-randomization-03.txt)

Fernando Gont fgont en si6networks.com
Vie Mayo 29 04:32:26 GMT+3 2020


Estimados,

Guillermo Gont, Miroslav Lichvar, y Fernando Gont publicamos esta 
revisón de nuestro I-D sobre aleatorización de puertos en NTP.

La revisión se encuentra en: 
https://tools.ietf.org/html/draft-ietf-ntp-port-randomization-03

Comentarios aceptados, y bienvenidos f(como nos levantamos :-) ).

I don't care if Monday's black
Tuesday, Wednesday, heart attack
Thursday, never looking back
It's Friday, I'm in love

Gont^2
https://www.youtube.com/watch?v=qdYwrFRxKH0




-------- Forwarded Message --------
Subject: New Version Notification for 
draft-ietf-ntp-port-randomization-03.txt
Date: Fri, 29 May 2020 00:13:38 -0700
From: internet-drafts en ietf.org
To: Guillermo Gont <ggont en si6networks.com>, Miroslav Lichvar 
<mlichvar en redhat.com>, Fernando Gont <fgont en si6networks.com>


A new version of I-D, draft-ietf-ntp-port-randomization-03.txt
has been successfully submitted by Fernando Gont and posted to the
IETF repository.

Name:		draft-ietf-ntp-port-randomization
Revision:	03
Title:		Port Randomization in the Network Time Protocol Version 4
Document date:	2020-05-28
Group:		ntp
Pages:		10
URL: 
https://www.ietf.org/internet-drafts/draft-ietf-ntp-port-randomization-03.txt
Status: 
https://datatracker.ietf.org/doc/draft-ietf-ntp-port-randomization/
Htmlized: 
https://tools.ietf.org/html/draft-ietf-ntp-port-randomization-03
Htmlized: 
https://datatracker.ietf.org/doc/html/draft-ietf-ntp-port-randomization
Diff: 
https://www.ietf.org/rfcdiff?url2=draft-ietf-ntp-port-randomization-03

Abstract:
    The Network Time Protocol can operate in several modes.  Some of
    these modes are based on the receipt of unsolicited packets, and
    therefore require the use of a service/well-known port as the local
    port number.  However, in the case of NTP modes where the use of a
    service/well-known port is not required, employing such well-known/
    service port unnecessarily increases the ability of attackers to
    perform blind/off-path attacks.  This document formally updates
    RFC5905, recommending the use of port randomization for those modes
    where use of the NTP service port is not required.

 


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

The IETF Secretariat





Más información sobre la lista de distribución Seguridad