Hello Rob and others
On 16.12.2013 23:01, Rob Janssen wrote:
Mouse wrote:
I find it interesting that the misbehaviour stopped almost immediately
upon my stopping NTP service on that address. (It would be difficult
for me to tell how promptly NTP traffic stopped.)
I think this can be well explained by the fact that the misbehaviour is not
from users of ntpd
but only from users of different crappy NTP implementations that usually in
fact are more
like SNTP and do things like issuing a DNS lookup for every time sync, have
very short
uptimes, and have no possibility for manual configuration. When you leave the
pool and
your DNS entry is gone, they very soon have no way to find you anymore.
Please keep in mind that with the nature of UDP also spoofed NTP
requests are used to hurt a third party (the source IP address
you see) through your (or any other Pool) NTP server. You can
never be sure if the IP address requesting really is the real
source of the request. To further investigate you would need to
ask your upstream provider and then he needs to ask his upstream
provider and so on, to find the real source of this requests.
To explain why this kind of requests stop after you remove your
server from the Pool, could be that the person / organization
which is abusing NTP, to hurt somebody else, is using the Pool as
source for IP addresses of open NTP servers to abuse for the
attack. If they ask a huge number of NTP server with a spoofed
source IP address, this could generate a large amount of traffic
toward the attacked third party and so fill up his internet
connection. The same thing is seen with DNS requests, as they are
also UDP. As I already mention on an other occasion in this list,
to get rid of this problem all ISPs should prevent their own
network from sending out packets with spoofed source IP address.
But this will probably be a dream. :-(
I am using kod and limited options equally for any source IP
address requesting NTP from my server. I can not care if this
requests are from too many clients behind NAT and those suffer
and do not get time (they should implement their own local NTP
servers), or if it is a spoofed source to hurt a third party. I
do this mainly for the second case, so that my servers do not
take part (or at least massively limit) in attacking a third
party. So I recommend every operator of an NTP server in the Pool
(or also if it is open to the whole Internet world) to implement
the following options (ntpd):
# should be fixed with ntp-4.2.5p178 (or later), eg. -4 / -6 not
# needed any more
# see -> https://support.ntp.org/bugs/show_bug.cgi?id=320
restrict -4 default limited kod notrap nomodify nopeer noquery
restrict -6 default limited kod notrap nomodify nopeer noquery
restrict default limited kod notrap nomodify nopeer noquery
I am not sure if other solutions like with iptables really help,
as it probably only adds some more overhead to your system, but
it can not keep the traffic from reaching your system / network
or stopping the attack in case of spoofed source IP address.
I left the pool on IPv4 more than 5 years ago, but I still see clients polling
my server even
though it has changed IP address. Apparently it has been hardwired in some
ntpd config
files at that time by getting my IP address from a pool.ntp.org lookup, getting
the reverse,
and writing that hostname in ntp.conf.
This is probably true, as I also have some other servers in my
ntp.conf, which I have "acquired" in this way. It is up to you if
to still provide NTP to the outside world or not. If you do not
want any more requests from third parties, then you could adjust
your ntp.conf to not serve them any more. Over time they will
adjust their ntp.conf and remove your server.
bye
Fabian
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool