Hi!
After a few tests it seems that using a
restrict default limited
statement in ntp.conf at least shows that a "malicious" client (a script
which tries to request the time with ntpdate in an endless loop as fast
as it can) is not served at all but a few times at the beginning.
A Windows client using this server with "iburst" works fine, so I'd
think this is what you could try as soon as you see a client hammering
requests at you.
Kind regards,
Heiko
--
------------------------------------------------------------------------
*MEINBERG Funkuhren*
Auf der Landwehr 22
D-31812 Bad Pyrmont, Germany
Tel.: ++49 (0)5281 9309-25
Fax: ++49 (0)5281 9309-30
eMail: [EMAIL PROTECTED] <mailto:[EMAIL PROTECTED]>
Internet: www.meinberg.de <http://www.meinberg.de/>
------------------------------------------------------------------------
Meinberg radio clocks: 25 years of accurate time worldwide
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers