On 2/21/2014 5:15 AM, Jim Reid wrote:
On 20 Feb 2014, at 20:42, Brian Rak <[email protected]> wrote:
You generally only need rate limits if you have monlist enabled for some
reason. There's no reason to expose monlist to the internet, so you shouldn't
need rate limits..
I've lost track of how many times I've said this, but iptables is not the
solution to these attacks. The solution is fixing your config to disable
monlist (add noquery to your 'restrict default' lines).
This is somewhat misleading.
Yes of course disabling monlist is a Very Good Thing and everyone should do it.
However that simply isn't enough and it's quite wrong of you to imply otherwise.
So far, I've seen this exact situation play out multiple times. Someone
says 'What iptables rules do I need?' or 'I came up with these iptables
rules', and it turns out they still have monlist enabled. These
problems tend to go away when you disable monlist (unless you're
actually the target of an attack)
FYI when my server was attacked (50-100Kqps), no monlist queries were involved.
This was disabled in the server too. The script kiddies didn't seem to be all
that bothered about amplification as an attack vector. So whatever they got
from a straight reflection attack was good enough from their perspective.
Assuming those cretins applied any thought before mounting the attack.
If you're server is being attacked, this is a far different story. If
you're being attacked, no amount of NTPD configuration is going to fix
it. If you're actually the target, iptables isn't going to help
either. These attacks very quickly get into the tens of gigabits range,
probably much higher.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool