Matt Wagner wrote:
On Mon, Dec 16, 2013 at 2:14 AM, Michael Rathbun <[email protected] 
<mailto:[email protected]>> wrote:
>
> 64.61.140.162 <http://64.61.140.162>:  total:  11328    avgint:  1
>
> hmm...

I used to get a bunch of these. I'm not quite sure what causes it, but it's 
annoying.
Some might have been a bunch of people using NAT, but in other cases it looked
like it was a single client querying me once a second.

I used to pretty aggressively seek these things out and block them in iptables, 
but
I eventually concluded that it was pointless.

I think it is a badly written client that behaves like this (sending a request 
every second)
when it does not get a reply.  It may be that your replies (and probably 
everyone's replies)
are blocked by a wrongly configured firewall at his end, and the client 
infinitely re-tries.

I have seen this behaviour back when I was still running a pool server on IPv4. 
 I enabled
rate-limiting and KOD that caused clients polling once every 15 seconds or more 
often,
and found that as a result I got some clients that polled every second.  
Resetting the blocks
made them stop doing that.   Apparently the rate-limiting mistriggered (maybe 
because of
an initial burst?), KOD was not implemented, and the fact that I ignored the 
polls just made
them send more often.

I concluded that filtering, rate-limiting and KOD are not suitable mechanisms 
to fend of
badly written or badly configured clients.

Right now I only run an IPv6 pool server, and I don't see this problem now.  
Probably there
are not so many badly written NTP clients that support IPv6.  At least for now.

Rob
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to