[ntp:questions] better rate limiting against amplification attacks?
Steve Kostecke
kostecke at ntp.org
Sat Dec 28 00:08:37 UTC 2013
On 2013-12-27, detha <detha at foad.co.za> wrote:
> A first step would be to have a default configuration where any
> functionality that can be used for reflection attacks with more than a say
> 2:1 ratio needs to be explicitly enabled, with warnings about this in the
> sample config file(s).
The NTP Reference Implementation has no default use case. So there is no
"baked-in" sensible default configuration. Some view this as a feature.
--
Steve Kostecke <kostecke at ntp.org>
NTP Public Services Project - http://support.ntp.org/
More information about the questions
mailing list