79207 policies in database
Link to program      
2024-07-08
2025-03-11
ntpd-rs Bug Bounty Program logo
Thank
Gift
HOF
Reward

Reward

ntpd-rs Bug Bounty Program

Project

ntpd-rs is an open-source implementation of the Network Time Protocol written in Rust, with support for the Network Time Security protocol and a focus on exposing a minimal attack surface.

This bug bounty program is paid for by the Sovereign Tech Resilience program.

Scope

You can find our repository on Github

Program Rules

  • We welcome external reviews by security researchers in order to identify bugs in our components.
  • The scope of this program only applies to the software we build, not to our CI infrastructure or our git/website hosting, and any such attack is prohibited.
  • Issues must be reproducible in our setup in order to be accepted as valid.
  • We operate this bounty program on a "One Fix One Reward" basis. We consider an issue duplicated if it was previously reported through other channels, and also if it affects a common code module and it was already reported for a different component.

Precautions

  • Do not include Personally Identifiable Information (PII) in your report and redact or obfuscate any PII that is part of your PoC (logs, screenshot, terminal captures, etc.).

Eligibility

Every valid report that helps us improve the security of the project is welcome, however, in order to qualify for monetary rewards the following eligibility requirements must be met at a minimum:

  • Source of the issue must be in the code published and developed on ntpd-rs (as opposed to a different repository in the same org, or a distribution-specific patch).
  • The vulnerability must be new and not have been reported before, here or elsewhere.
  • The vulnerability must meet the qualifying criteria as defined in the relevant section.
  • A reproducer (code and/or configuration and/or sequence of commands) must accompany the report, the issue must be clearly described, and the issue must be reproducible.
  • You must not be a maintainer of the ntpd-rs project.
  • Our analysis is always based on the worst impact demonstrated in your PoC
  • Only reports affecting the main branch of the project are eligible.

Rating and Responsible Disclosure

CVSS is used to rate and categorize vulnerabilities. Vulnerabilities will be publicly disclosed after sufficient time has passed and fixes have been backported where needed, if deemed necessary in coordination with mainstream Linux distributions.

Advisories will be published on the advisory page of our GitHub repository, and where deemed necessary as CVEs and on external mailing-lists like oss-security.

We handle the full disclosure process and expect submitters not to disclose any findings themselves. If requested, we will fully credit the reporters in the advisories.

The process for external reporting is described on GitHub

In Scope

Scope Type Scope Name
web_application

https://github.com/pendulum-project/ntpd-rs

web_application

https://github.com/pendulum-project/timestamped-socket

web_application

https://github.com/pendulum-project/clock-steering

Out of Scope

Scope Type Scope Name
undefined

Known protocol limitations related to the NTP protocol

undefined

Anything related to the NTPv5 and/or NTS Pool KE features (both disabled by default), unless it impacts other parts of the software

undefined

Anything related to the CI pipeline or GitHub related hosting

web_application

Anything related to *.ntpd-rs.pendulum-project.org


This program have been found on Yeswehack on 2024-07-08.

FireBounty © 2015-2025

Legal notices | Privacy policy