Denisism wrote:
DPr0f wrote: if you're still running an internet server on 10.6.x, you're used to fending for yourself.
By this, can I take it to mean that 10.6.x is only vulnerable to the current NTP exploit if one is running a server on the machine? In other words, if I'm not running any public web servers, FTP servers, etc. on a Snow Leopard machine, I should be relatively safe from the NTP vulnerablilty? Or can I get hacked via the NTP vulnerability by simply connecting my Snow Leopard machine to the Internet or WiFi hotspot and/or going to a website?
There are a lot of unknowns with this vulnerability, but IMO Apple's global (and extremely fast) release of the patch for all OS X machines (client and server) speaks to the universal nature of the vulnerability: if you're running ntp and your OS X machine (OS X Client or Server) is connected to the Internet, you should assume that the machine is vulnerable.
The only really way to really protect it is to not run ntp, which you can accomplish by unchecking the checkbox for "Set date and time automatically" in the Date & Time prefpane and if you're running OS X Server, going into Server Admin-->Settings-->Date & Time (tab)-->Date & Time (sub-tab) and unchecking the same checkbox there (they seem to work independently, so uncheck them both to be sure).
When you're done, you can check to see if ntp is not running in the Terminal with "ps ax | grep ntp". If you only see a line ending with "grep ntp" and nothing else, then ntp is not running and you're good to go. If you see anything else, check your settings.
After this, you'll need to periodically check to see if your date and time is correct, which in many cases is no biggie, but in cases of OpenDirectory and other servers could well be critical to proper operation. Also, if it's a desktop machine of that vintage, might be time to stick a new PRAM battery in it (the little battery on the mainboard), as that's what maintains the date and time when the machine is powered down.