<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filers vulnerable to NTP Reflection Attack in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33536#M7897</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paraphrased from my support case,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif';"&gt;Due to the way ONTAP works, there is no ntp.conf file and so the fix will have to be an ONTAP patch. &lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469" title="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469" target="_blank"&gt;http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif';"&gt;As a workaround either disable NTP until a fix is released, or block port 123/udp with a&amp;nbsp; firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Feb 2014 18:32:39 GMT</pubDate>
    <dc:creator>spenticoff</dc:creator>
    <dc:date>2014-02-12T18:32:39Z</dc:date>
    <item>
      <title>Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33509#M7886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks" title="http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks" target="_blank"&gt;http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks&lt;/A&gt;&lt;BR /&gt;&lt;A class="jive-link-external-small" href="https://isc.sans.edu/forums/diary/NTP+reflection+attack/17300" target="_blank"&gt;https://isc.sans.edu/forums/diary/NTP+reflection+attack/17300&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our filers have been used in a large scale NTP reflection attack. I can not find any documentation on how to restrict or turn off monlist queries.&amp;nbsp; options.timed doesn't seem to handle that part of the config&lt;/P&gt;&lt;P&gt;Any one have ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:44:07 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33509#M7886</guid>
      <dc:creator>spenticoff</dc:creator>
      <dc:date>2025-06-05T05:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33514#M7888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't have the slightest.&amp;nbsp; I would encourage you to call support immediately and report back to us.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 19:49:17 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33514#M7888</guid>
      <dc:creator>JGPSHNTAP</dc:creator>
      <dc:date>2014-02-04T19:49:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33519#M7890</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What Data ONTAP version? In 8.x you should be able to edit ntp configuration in diag shell.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes, it should be reported as soon as possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Feb 2014 04:09:17 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33519#M7890</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-02-05T04:09:17Z</dc:date>
    </item>
    <item>
      <title>Re: Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33523#M7892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I asked NetApp support this same question, and they opened a BURT, 787469.&amp;nbsp; No big deal to me but sorry to hear your filer was misused.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2014 13:29:29 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33523#M7892</guid>
      <dc:creator>DONSIZEMOREUNC</dc:creator>
      <dc:date>2014-02-12T13:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33531#M7896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BURT is not public ☹&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2014 13:44:38 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33531#M7896</guid>
      <dc:creator>aborzenkov</dc:creator>
      <dc:date>2014-02-12T13:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: Filers vulnerable to NTP Reflection Attack</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33536#M7897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paraphrased from my support case,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif';"&gt;Due to the way ONTAP works, there is no ntp.conf file and so the fix will have to be an ONTAP patch. &lt;BR /&gt;&lt;/SPAN&gt;&lt;A href="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469" title="http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469" target="_blank"&gt;http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&amp;amp;Display=787469&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: 'Calibri','sans-serif';"&gt;As a workaround either disable NTP until a fix is released, or block port 123/udp with a&amp;nbsp; firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Feb 2014 18:32:39 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/Filers-vulnerable-to-NTP-Reflection-Attack/m-p/33536#M7897</guid>
      <dc:creator>spenticoff</dc:creator>
      <dc:date>2014-02-12T18:32:39Z</dc:date>
    </item>
  </channel>
</rss>

