Anssi Johansson:
> I'd urge everyone on this list to check if their servers are seeing
> traffic from 27.50.2.183 ('tcpdump -n host 27.50.2.183' for
> example). If your server is sending excessive amounts of packets to
> that host, please adjust your server configuration accordingly.
> Thanks.

I don't see any traffic supposedly from this host to my server, which is 
in @, europe, uk zones.

Nonetheless, I've added "limited kod" to ntp.conf.  I'm slightly 
surprised that NTP allows this sort of amplification attack by default; 
perhaps the pool website could provide a sample ntp.conf file suitable 
for use by public servers?

-- 
        -- river.                      | Free Usenet: http://news.rt.uk.eu.org/
Non-Reciprocal Laws of Expectations:   | PGP: 2B9CE6F2
    Negative expectations yield negative results.
    Positive expectations yield negative results.

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to