I see little logic in sending back a KOD as it defeats the purpose of limiting abusive clients to begin with. The default restrict line for teardrop.ca looks as follows:

restrict    default             noquery nomodify notrap nopeer limited

I did a little test and sent 32 requests in 2 seconds to teardrop, not surprising after about the 8th request all remaining requests were dropped/ignored.

If you do an "ntpdc -c monlist" you see a line such as:

remote address port local address count m ver code avgint lstint
===============================================================================
127.0.0.1              55778 216.221.85.101       101 3 4    1f0     74

What does "code" mean...

It is simply a hex encoding for the restrict line values associated with the client.

0x100 -> notrap
0x080 -> nomodify
0x040 -> noquery
0x020 -> limited (only set when the client has reached it's limit)
0x010 -> nopeer

After awhile the IP above will have the code 0x1d0 which means "limited" has been removed. The limited code is only set when a client becomes abusive.

You can modify how "strict" the limit keyword is but I see little point in doing so. The defaults catch the people that would annoy me the most.

--
 .-------------------------------------.
( Biggest security gap -- an open mouth )
 `-------------------------------------'
--
Paul-Andrew Joseph Miseiko

On Thu, 22 Sep 2005, Kirk Strauser wrote:

On Thursday 22 September 2005 09:49, Joel Reicher wrote:

I think average and minimum are the stats reported by the ntpdc monlist
command for avging and lstint.

That'd make sense.  Thanks.

Your configuration file looks fine to me. You've probably hit the issue
that has been spoken about many times on this list: ntpd can't do
anything about a client that won't obey KOD packets.

I understand that part.  There's not much to do with broken clients but
ignore them somehow.  What irked me was seeing my server continually
replying to those clients:

$ sudo tcpdump -n port 123 and host 71.10.124.9
 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
 listening on fxp0, link-type EN10MB (Ethernet), capture size 96 bytes
 10:26:21.124774 IP 71.10.124.9.62936 > 10.0.5.16.123: NTPv4, Client, length 48
 10:26:21.124845 IP 10.0.5.16.123 > 71.10.124.9.62936: NTPv4, Server, length 48
 10:26:22.120608 IP 71.10.124.9.62936 > 10.0.5.16.123: NTPv4, Client, length 48
 10:26:22.120805 IP 10.0.5.16.123 > 71.10.124.9.62936: NTPv4, Server, length 48
 10:26:25.125081 IP 71.10.124.9.62936 > 10.0.5.16.123: NTPv4, Client, length 48
 10:26:25.125261 IP 10.0.5.16.123 > 71.10.124.9.62936: NTPv4, Server, length 48

I just wish I could tell ntpd to quit replying to this guy.

Out of curiosity, I never see any KOD packets logged in the logfile.
If my server sends some, should I see entries when it happens?  Surely
clients as egregiously broken as the one above would meet even the most
conservative "discard" settings, shouldn't they?

--
Kirk Strauser

_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to