[email protected] said: > If you run 'ntpdc -nc monlist YOUR_HOST' before applying, you will see that, > for one small query, you get a list of 600 hosts using your server back. > There's an active attack going around, in which abusers are doing this with > forged IPs (which works since it's UDP traffic) to amplify their bandwidth.
There is a complication in there. If your restrict stuff is setup to allow query from your local LAN, that doesn't mean you will contribute to amplification attacks from the outside world. -- These are my opinions. I hate spam. _______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool
