Hello, I just noticed my ipv6 pool server is getting a steady flow of NTP queries from IP addresses that seem to be autoconfigured (ff:fe in the middle host part), but the network part is all zeroes. Here's a small sample:
IP6 (class 0x28, hlim 56, length: 56) ::5cb5:3aff:fe1f:4dd2.39105 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 53, length: 56) ::8829:80ff:fe05:c012.52152 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 57, length: 56) ::9068:19ff:fe1a:922.42155 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 57, length: 56) ::fd:dbff:fe05:3ba.49832 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 57, length: 56) ::a44a:2cff:fe8c:92b3.48097 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 56, length: 56) ::5cb5:3aff:fe1f:4dd2.33076 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 56, length: 56) ::78de:6fff:fe34:f06.54550 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 56, length: 56) ::ecfb:65ff:fee9:f8e1.50450 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 57, length: 56) ::a44a:2cff:fe8c:92b3.57953 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 57, length: 56) ::fce5:5eff:fe12:3639.35756 > [udp sum ok] NTPv3, length 48 IP6 (class 0x28, hlim 53, length: 56) ::2410:86ff:fe77:465a.60466 > [udp sum ok] NTPv3, length 48 The contents of the packets seems to be otherwise valid NTP queries. Anybody else seeing this? The hop limit counters vary a bit which indicates that there probably are multiple different network sources for these packets. Replies obviously don't get through because there is no "zero-route" in the IPv6 routing table. At the moment I'm getting about 20 such packets per minute. Probably just a misconfiguration that is easy to repeat? Tapio _______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool
