[ntp:questions] NTP does not reply to IP addresses that start with 69

Unruh unruh-spam at physics.ubc.ca
Wed Apr 2 21:43:47 UTC 2008


mayer at ntp.isc.org (Danny Mayer) writes:

>Dave,

>4.1.0 was a long time ago in a galaxy far, far away. We don't care about 
>that version any more. Anyone who wants help needs to upgrade to a more 
>recent version.

IF you knoww that this was a bug in a particular old version and that the
new versions fix it, then this is good advice. Otherwise it looks like "Go
away-- i will set you a sufficient number of useless tasks that you stop
posting here."

If someone knows that 4.1.0 screwed up all IPs with 69 at the start then
this is a reasonable bit of advice. Or if it is the port that is being
used, and not the "69" then pointing out that that is a bug in 4.1.0 which
is now fixed is useful. 



>Danny

>David L. Mills wrote:
>> Guys,
>> 
>> I was afraid this might happen. There is no such port check in the 
>> development branch, so somebody broke my rules not to change ntp_proto.c 
>> withhout my permission. The result not only breaks the specification, it 
>> disables symmetric active/active modes. Any check like this has to be 
>> mode dependent, so whoever made the change eithher doesn't believe the 
>> specification or doesn't understand symmetric modes or both.
>> 
>> This is the main reason I object to changing the files I specifically 
>> reserve for my own paws, including ntp_proto.c, ntp_crypto.c, 
>> ntp_loopfilter.c and ntp-keygen.c, between development merges and I'm 
>> rather pissed off.
>> 
>> Dave
>> 
>> Ronan Flood wrote:
>>> On Tue, 1 Apr 2008 12:44:17 -0400, "Ray" <nospam.mail at nrc.ca> wrote:
>>>
>>>
>>>> input_handler: if=2 fd=6 length 48 from 453fdb02 69.63.219.2
>>>> receive: at 38 132.246.168.2<-69.63.219.2 restrict 00
>>>
>>>> receive: at 182 132.246.168.2<-69.156.105.192 restrict 00
>>>> receive: at 182 132.246.168.2<-69.156.105.192 mode 3 code 2
>>>> MCAST *****sendpkt(fd=6 dst=69.156.105.192, src=132.246.168.2, ttl=0,
>>>> len=48)
>>>> transmit: at 182 132.246.168.2->69.156.105.192 mode 4
>>>
>>>
>>>>> Ray> I am running stratum-1 servers with NTP version 4.1.0.
>>>
>>> Compare the above two client addresses in the output of
>>> "ntpdc -nc monlist 132.246.168.2" :
>>>
>>> remote address  port local address count m ver drop   last   first
>>>
>>> 69.63.219.2      353 132.246.168.2    99 3 3      0     18    6354
>>>
>>> 69.156.105.192  2605 132.246.168.2    11 3 4      0    294    6309
>>>
>>>
>>> Then examine this piece of code in ntp-4.1.0/ntpd/ntp_proto.c receive() :
>>>
>>>         if (!(SRCPORT(&rbufp->recv_srcadr) == NTP_PORT ||
>>>             SRCPORT(&rbufp->recv_srcadr) >= IPPORT_RESERVED)) {
>>>                 sys_badlength++;
>>>                 return;                         /* invalid port */
>>>         }
>>>
>>> QED.  Time to upgrade to a later version ...
>>>
>> 
>> _______________________________________________
>> questions mailing list
>> questions at lists.ntp.org
>> https://lists.ntp.org/mailman/listinfo/questions
>> 




More information about the questions mailing list