On Sat, 2010-04-17 at 01:35 +0200, Carlos E. R. wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
On 2010-04-17 01:24, Hans Witvliet wrote:
On Fri, 2010-04-16 at 23:02 +0200, Carlos E. R. wrote:
How about spoofing the ntp-source and doing a reboot? Logging in as ca-admin and signing a CSR...
No need for root privilege... afaics, just the knowledge of the ip of the ntp-server and some iron doing an ntp-impersonation!
As I said, no, it would not work, if you do things properly. :-)
You do not sync against a single ntp server. You sync against a dozen, simultaneously, so the attacker has to pervert the majority of them, and do so in sync or the perversion is detected immediately.
Well, that's the issue. afaics, we have just a single reliable (!) ntp-source..... There might be others, but i allways get the same one. hw -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org