Last night, I shut down my NTP4.2.x servers until I can upgrade them. The server that I have in the pool is running totally custom code -- it will be interesting to see if the load on that goes up as other servers get shut down.

I also started to capture NTP packets that were inbound to all the systems that used to run NTP -- these were accessible from the Internet. Happily I have seen no evidence of scanning activity. While this doesn't mean that nobody is scanning (and I do know at least one organization scanning for NTP), nobody is scanning at a high rate. Given the claims that these bugs are already being exploited, this probably means that they are being used in a targeted manner.

There appear to be >3 million exposed NTP servers on the internet.

Philip
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to