Hi!

After a few tests it seems that using a

restrict default limited

statement in ntp.conf at least shows that a "malicious" client (a script which tries to request the time with ntpdate in an endless loop as fast as it can) is not served at all but a few times at the beginning.

A Windows client using this server with "iburst" works fine, so I'd think this is what you could try as soon as you see a client hammering requests at you.

Kind regards,
Heiko



--
------------------------------------------------------------------------

*MEINBERG Funkuhren*
Auf der Landwehr 22
D-31812 Bad Pyrmont, Germany
Tel.: ++49 (0)5281 9309-25
Fax: ++49 (0)5281 9309-30
eMail: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
Internet: www.meinberg.de <http://www.meinberg.de/>

------------------------------------------------------------------------

Meinberg radio clocks: 25 years of accurate time worldwide

_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to