[ntp:questions] Very rapid polling
lpitcher at teksavvy.com
Wed Feb 25 18:18:58 UTC 2009
On February 25, 2009 13:12, in comp.protocols.time.ntp, Rob
(nomail at example.com) wrote:
> jlevine <jlevine at boulder.nist.gov> wrote:
>> 2. Sending any reply at all doubles the network traffic and makes
>> attack more effective. Therefore, all of the NIST servers log the
>> event and
>> the source ip but do not respond. I think it is not appropriate for a
>> timing laboratory to knowingly send the wrong time.
> While that is certainly true, you should be aware that malbehaving NTP
> clients do exist that handle the problem of not receiving a reply by
> sending the request more often.
Sounds like a 2-year-old child, wanting it's parent's attention
"Mommy.... Mommy.... Mommy, mommy, mommy... Mommy, mommy, mommy...
Master Codewright & JOAT-in-training | Registered Linux User #112576
http://pitcher.digitalfreehold.ca/ | GPG public key available by request
---------- Slackware - Because I know what I'm doing. ------
More information about the questions