Hello

Since yesterday (2. June 2013) around 20:45 (CEST) I have a massive amount of requests from 176.42.200.13 (may be spoofed) with over 90'000 packets / min, see [1]. Currently all requests are originating from UDP port 1042. The mentioned IP address itself is currently not reachable (ping, traceroute, mtr, http). This requests do add about 1 Mbit/s to my network traffic, see [2] (scaled logarithmically). But thanks to the 'limited' option in ntp.conf my ntpd does not answer to most of those requests. There is no blocking / limiting firewall rule in place regarding UDP/123.

  [1] http://www.home4u.ch/ntp/ntp1.home4u.ch.html
  [2] http://www.home4u.ch/mrtg/gate1.html

According to whois the IP address belongs to:

inetnum:        176.42.200.0 - 176.42.207.255
netname:        TR-TELLCOM-BB-FTTX-KON-MER-SAM-TEKD
descr:          Tellcom Ankara Fiber Dynamic
country:        TR

This is not surprising to me, as my server is also in the tr pool zone. I am glad I do not see this huge amount of requests on my other 2 servers and on 2 servers from a friend, which are also in the tr zone.

Does anybody else with servers in the tr pool zone see such a request flood?


PS: It would be really nice, if all ISP would only allow outbound traffic with IP addresses originating from their own networks. This is the only thing which really could help against spoofed UPD requests.


bye
Fabian
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to