Hello Koos

On 09.08.2012 17:04, Koos van den Hout wrote:
Quoting Sean Reifschneider who wrote on Tue 2012-08-07 at 15:45:
 It definitely was listed back before 2005...  We were in the pool for
 several years, but over the period of a week or two we had two rather irate
 people call our emergency support line, demanding that we fix the system
 that was attacking their network.  On port 123/udp.  In response to packets
 from their network.  :-(  So I removed us from the pool.

I had two of those (via e-mail) kindly sending in the 'evidence' in the
form of logfiles from their "firewall". Explaining the service and that
it only responded to requests did not help because that was not what the
"firewall" was saying, so I decided to add a firewall drop rule for the
source IPs 83.162.1.106, 86.83.253.130 and 12.34.195.206.

According to pflog, they still try from time to time so either they
fixed their "firewall" or they are slowly going through the pool, one
complaint at a time.

I did not had any such request / complaint yet. For my ntp servers I am using dedicated IP addresses with proper PTR records in DNS. As there are web servers running on this systems anyway, I did setup it that web requests to *.pool.ntp.org are redirected to www.pool.ntp.org (as mention in the documentation) and requests to the hostnames (e.g. ntp1.home4u.ch) or IP address are redirect to the informational web page at [1]. There I have also the following paragraph, which I think should help prevent such requests / complaints:

"If you see suspicious NTP (UDP port 123) connections from any of your systems to one of the home4u.ch NTP servers, then your system is probably using *.pool.ntp.org for timekeeping. If you have any issue with the home4u.ch NTP servers, please contact me with as many details as possible, so I can try to resolve it."

  [1] http://www.home4u.ch/ntp.html


bye
Fabian
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to