Hi Jeff The range from which you're seeing this traffic belongs to the Amazon Elastic Compute Cloud (EC2) http://www.amazon.com/ec2
In essence, it's a hosting farm; please provide very specific details about the source of the traffic (as well as the destination IP/ports), including: -src IPs -src ports -time event started (include TZ and whether hosts are NTP synched - yes, I know you're an NTP service :) ) -intensity (you mentioned 30 req/min, is that each of the 11 or total?) pref some log entries We don't control the apps (or even O/Ses) of the instances; although we make NTP services avail to the users, we don't specifically enforce use of our servers. That said, we can track the src and will contact the instance owner(s) and have them limit their traffic. Regards Kuyper Hoffman Amazon EC2 NOC Jeffrey Ferland wrote on 2007-03-29 16:26: > I have noticed 11 clients making consistent NTP requests to a public > time server of mine at a rate of one request every 2 seconds, all from > this netblock. For the time being, I now respond to time requests from > your netblock with ICMP Admin Prohibited packets. I assume that many > other hosts in your range of allocated addresses are configured to use > public NTP pool servers, and also request at this very high rate of > traffic. Properly configured NTP clients should not request more than > once per minute at the lowest threshold, and over 15 minutes or higher > when properly synched to another clock. > > Please review your configuration for NTP services. Given the number of > hosts you likely run from this address, I also recommend having only 2 > machines which query to the outside world, and the rest of your machines > querying from those two. > > Thank you for your time, Amazon.com > > -Jeff > SIG: HUP _______________________________________________ timekeepers mailing list [email protected] https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers
