Zitat von Rob Janssen <[email protected]>:

Chuck Swiger wrote:
Hi--

On Oct 17, 2012, at 10:04 AM, sh3120 wrote:
Have sites complaining that 72.8.140.222 is showing up on command and control server. After research determined that IP is listed in the NTP.POOL.ORG listing of time servers. Unsure who to report this too to get it off the list.
The mailing list for the NTP pool is <[email protected]>.

Whether a machine has been infected by malware is not related directly to whether it is serving good time. The NTP pool has a scoring mechanism which will remove that IP if
it no longer provides good time:


I think that is not the issue.
The problem is that some intrusion detection systems or ISP systems that attempt to detect malware will see that someone is communicating with an IP that is on a list of command and control servers,
without checking in detail what kind of communication it is.

The result is all kinds of alarm bells going off, and potentially the customer being disconnected
and advised to scan their system for malware.

So, we should (if we are not already doing so, I seem to remember that this subject was discussed before) remove any systems that are know to be C&C servers from the list of active NTP servers, no matter
if they are serving correct time or not.

Of course it will not protect everyone. When the client is a user that reboots every day, he will stop using that particular address within a couple of hours. But a server that has once
learned the address could keep using it nearly forever.

And of course to implement a feature like this, some feed of coming and going C&C servers is
required.

No, this Pool is not intended to decide if someone is a good citizen or not, but only to deliver good timesource. If you disagree you should use some handcraftet timesource so you are free to apply any rules you like.

Regards

Andreas


_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to