Subject:
Re: shodan.io actively infiltrating ntp.org IPv6 pools for,> scanning purposes (Ask Bj?rn Hansen)
From:
"Ray Hunter (v6ops)" <[email protected] <mailto:[email protected]>>
Date:
Fri, 29 Jan 2016 13:56:28 +0100

To:
[email protected] <mailto:[email protected]>

Hi Luca (and everyone),

I removed those servers yesterday. Brad had been helping look to see if others were doing something similar.

I think the behavior was falling well outside what's reasonably expected from a server operator participating in the pool.

The operator had also been adding the same server multiple times in order to "attract" more traffic which is definitely outside the guidelines.

It's not something we want to support, though being the "connector" between users and volunteer server operators on an protocol without any encryption or authentication we can't pretend there's more control than there is.

I might just be too cynical, but it also feels like something we should come to expect. Anyone who's looked at traffic to an Internet facing IPv4 address have seen much worse.

The NTP pool usage being the source sucks, but in general I am sure we will see more of this as IPv6 usage goes up. Because you can't scan the IPv6 space, there will be some value in "active addresses" so eventually we will see IP addresses traded like other PII data is now. Choose the websites you visit carefully?



Ask


I'm also convinced the NTP pool is not the first, nor will it be the last, service to be abused for facilitating nefarious scanning.

Perhaps quoting an official IETF Best Current Practice RFC in the terms of use could cover you/ justify removing these servers from the pool/ taking other actions?

https://tools.ietf.org/pdf/rfc7258.pdf Pervasive Monitoring is Considered an Attack.

--
regards,
RayH

<https://www.postbox-inc.com/?utm_source=email&utm_medium=siglink&utm_campaign=reach>
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to