[top-posting damage repaired manually]
>> A soon as the server is in the pool (the score is over 5.0) I am
>> flooded with too many requests (more than 5000 in 1 second) that
>> make the network fail.  I do not think it is normal, how can I
>> protect myself?
> That very well could be normal, if there are not many other pool
> servers near you.

It may very well be normal in the sense of normative, but even an
unintentional DoS attack is still a DoS attack.

I used to see similar things until I added monitoring at my boundary to
detect and block ill-behaved pounders on my NTP server.  Those who
query my NTP daemon too frequently will find it simply stops
responding.  However, some of the pounders are so ill-behaved as to
keep hammering away even long after being blocked.  For example, the
current worst offender I'm seeing is 70.67.40.245, which has been
getting no responses since some time on 2009-07-06, but it's still
pounding away, currently at about one packet every 2.656 seconds.

/~\ The ASCII                             Mouse
\ / Ribbon Campaign
 X  Against HTML                [email protected]
/ \ Email!           7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to