Anssi Johansson:
> I'd urge everyone on this list to check if their servers are seeing
> traffic from 27.50.2.183 ('tcpdump -n host 27.50.2.183' for
> example). If your server is sending excessive amounts of packets to
> that host, please adjust your server configuration accordingly.
> Thanks.
I don't see any traffic supposedly from this host to my server, which is
in @, europe, uk zones.
Nonetheless, I've added "limited kod" to ntp.conf. I'm slightly
surprised that NTP allows this sort of amplification attack by default;
perhaps the pool website could provide a sample ntp.conf file suitable
for use by public servers?
--
-- river. | Free Usenet: http://news.rt.uk.eu.org/
Non-Reciprocal Laws of Expectations: | PGP: 2B9CE6F2
Negative expectations yield negative results.
Positive expectations yield negative results.
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool
