ONTAP Discussions

Highlighted

Filers vulnerable to NTP Reflection Attack

http://www.symantec.com/connect/blogs/hackers-spend-christmas-break-launching-large-scale-ntp-reflection-attacks
https://isc.sans.edu/forums/diary/NTP+reflection+attack/17300

Our filers have been used in a large scale NTP reflection attack. I can not find any documentation on how to restrict or turn off monlist queries.  options.timed doesn't seem to handle that part of the config

Any one have ideas?

5 REPLIES 5
Highlighted

Re: Filers vulnerable to NTP Reflection Attack

I don't have the slightest.  I would encourage you to call support immediately and report back to us. 

Highlighted

Re: Filers vulnerable to NTP Reflection Attack

What Data ONTAP version? In 8.x you should be able to edit ntp configuration in diag shell.

And yes, it should be reported as soon as possible.

Highlighted

Re: Filers vulnerable to NTP Reflection Attack

I asked NetApp support this same question, and they opened a BURT, 787469.  No big deal to me but sorry to hear your filer was misused.

Highlighted

Re: Filers vulnerable to NTP Reflection Attack

BURT is not public ☹

Highlighted

Re: Filers vulnerable to NTP Reflection Attack

Paraphrased from my support case,

Due to the way ONTAP works, there is no ntp.conf file and so the fix will have to be an ONTAP patch.
http://support.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=787469

As a workaround either disable NTP until a fix is released, or block port 123/udp with a  firewall.

View solution in original post

Check out the KB!
Knowledge Base
All Community Forums