In case you missed it, OVH enabled VAC on port 123 packets to prevent their network from assisting in DDoS attacks utilizing NTP amp.
I run my pool server behind OVH and haven't seen any issues yet. They appear to only be filtering monlist commands, yet allowing queries and peers. I checked openntpproject for the /24 I'm on (192.95.20.208) and there's no results, but, on other similar networks there are still offenders http://openntpproject.org/search2.cgi?botnet=yessir&search_for=192.95.22.0%2F24 . Thanks, -- James Hartig Software Engineer @ Grooveshark.com http://twitter.com/jameshartig _______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool
