[ntp:questions] better rate limiting against amplification attacks?

Steve Kostecke kostecke at ntp.org
Sat Dec 28 00:08:37 UTC 2013


On 2013-12-27, detha <detha at foad.co.za> wrote:

> A first step would be to have a default configuration where any
> functionality that can be used for reflection attacks with more than a say
> 2:1 ratio needs to be explicitly enabled, with warnings about this in the
> sample config file(s).

The NTP Reference Implementation has no default use case. So there is no
"baked-in" sensible default configuration. Some view this as a feature.

-- 
Steve Kostecke <kostecke at ntp.org>
NTP Public Services Project - http://support.ntp.org/



More information about the questions mailing list