Podman Machine configured to use hacked NTP server? #14193
Replies: 8 comments
-
I see no mention of that IP, or NTP in general, in our ignition config. Possible this is a more general FCOS issue? @baude PTAL |
Beta Was this translation helpful? Give feedback.
-
A friendly reminder that this issue had no activity for 30 days. |
Beta Was this translation helpful? Give feedback.
-
@Luap99 @dustymabe @baude @mccv1r0 @giuseppe @mtrmac Any ideas? |
Beta Was this translation helpful? Give feedback.
-
but it also will pick up NTP servers from DHCP if they are advertised there. what does If you run journalctl and look at the logs for NetworkManager do you see anything about a dispatcher getting run to set an NTP server? |
Beta Was this translation helpful? Give feedback.
-
The pool is inherently going to point at various unpredictable IP addresses over time. Insisting on having control over the individual destinations is fine, of course, but requires not using the configured-by-default pool. |
Beta Was this translation helpful? Give feedback.
-
Is this an issue with coreos, the user or Podman? |
Beta Was this translation helpful? Give feedback.
-
Assuming the user didn't change anything and their DHCP server didn't provide an NTP server then chrony should be using Either way it's not really something the FCOS team can do anyting with. If there is a server in |
Beta Was this translation helpful? Give feedback.
-
Moving this issue to a discussion. |
Beta Was this translation helpful? Give feedback.
-
Is this a BUG REPORT or FEATURE REQUEST? (leave only one on its own line)
/kind bug
Description
I noticed yesterday that after leaving my Podman machine running, my terminal had reset and I got a warning about a datagram proxy request from what appears to be Podman machine to host machine. The request seems to have failed but was for NTP to what appears to be a rogue or compromised NTP server in Switzerland. Not sure how / why Podman would choose to use this NTP server, possibly configured when the VM was created? A little concerning, and wanted to make a note of it here.
Here's the screenshot of the error
Here's some IP info regarding 85.195.227.163. Looks to be a compromised Wordpress site that just so happens to be listening for NTP too. 🤔
https://www.threatcrowd.org/ip.php?ip=85.195.227.163
https://otx.alienvault.com/indicator/ip/85.195.227.163/?utm_medium=InProduct&&utm_source=ThreatCrowd
Here's an lsof showing a different (current) gvproxy request, for reference. Looks like its using a NTP in Sweden at the moment, so thinking that Podman is perhaps using some European NTP pool by default and maybe the compromised Swiss IP is just randomly chosen from the pool?
Steps to reproduce the issue:
podman machine init
podman machine start
sleep / wake the host computer?
Describe the results you received:
See description
Describe the results you expected:
Something a little more local in the NTP request. eg. ntp.apple.com here in the US.
Additional information you deem important (e.g. issue happens only occasionally):
Output of
podman version
:Output of
podman info --debug
:Package info (e.g. output of
rpm -q podman
orapt list podman
):Have you tested with the latest version of Podman and have you checked the Podman Troubleshooting Guide? (https://github.com/containers/podman/blob/main/troubleshooting.md)
No
Additional environment details (AWS, VirtualBox, physical, etc.):
Beta Was this translation helpful? Give feedback.
All reactions