[ntp:questions] Very rapid polling

Lew Pitcher lpitcher at teksavvy.com
Wed Feb 25 18:18:58 UTC 2009


On February 25, 2009 13:12, in comp.protocols.time.ntp, Rob
(nomail at example.com) wrote:

> jlevine <jlevine at boulder.nist.gov> wrote:
>>    2. Sending any reply at all doubles the network traffic and makes
>> an
>> attack more effective. Therefore, all of the NIST servers log the
>> event and
>> the source ip but do not respond. I think it is not appropriate for a
>> national
>> timing laboratory to knowingly send the wrong time.
> 
> While that is certainly true, you should be aware that malbehaving NTP
> clients do exist that handle the problem of not receiving a reply by
> sending the request more often.

Sounds like a 2-year-old child, wanting it's parent's attention

"Mommy.... Mommy.... Mommy, mommy, mommy... Mommy, mommy, mommy...
Mommymommymommymommymommy...."

;-)

-- 
Lew Pitcher

Master Codewright & JOAT-in-training | Registered Linux User #112576
http://pitcher.digitalfreehold.ca/   | GPG public key available by request
----------      Slackware - Because I know what I'm doing.          ------





More information about the questions mailing list