Zitat von Thomas Pfaff <[email protected]>:
Hello, list.
My ntp server is in the pool and since it was added I've been looking
more closely at the network traffic (out of curiosity) and there's a
few things that has me confused that I was hoping you guys could help
me understand.
Looking at a tcpdump on my external interface I see, obviously, a lot
of ntp requests and responses. Now, once in a while a response gets
answered with an icmp port unreachable, transaction something like
example.com.2690 > ntp.tp76.info.123: v4 client strat 0 poll 0 prec 0 (DF)
ntp.tp76.info.123 > example.com.2690: v4 server strat 4 poll 0
prec -6 [tos 0x10]
example.com > ntp.tp76.info: icmp: example.com udp port 2690 unreachable
Why does it say "answer me on port 2690" and when I do I get "sorry,
that port is unreachable"? (read on; graph coming up)
This are either forged sender addresses or a client sitting behind
some firewall or NAT which don't let the answer pass back and rejects
it. We have this too in our traffic.
My second question; why is the ntp traffic so spikey? For an hour I
get about 150 requests per minute and then suddenly I get about 7000
requests per minute for a short time, and then it drops.
Most of the time it is because some devices prefer some fixed time of
day to sync with the pool instead of using a random starttime or
interval. So these clients all rush in at nearly the same time. But
7000 request per minute isn't something to worry about, no? We once
had an offender with ~800 packets per second, it only stopped after
1,2GB Traffic even though we dropped all packets from this IP. The
ntpd doesn't really care anyway, it hummed along with around 5% CPU
usage on a really slow machine even with that packet rate.
Regards
Andreas
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool