Hello,

On 1.4.2015 23:50, Harlan Stenn wrote:
I think that both would get fixed if ntpd occasionally did another DNS
lookup for each server it is using and switched to a new address if
the address it is using isn't one of the addresses returned.

That's the bigger-scope TTL issue.  But that will not directly address
the issue of "is the pool server I am currently using still listed as
being "valid".

This could be done by adding a reverse zone into pool.ntp.org that includes all valid pool server ip addresses. If you just query forward pool.ntp.org, depending on from where and when you ask, you will get a bit different set of ip addresses returned. They probably won't contain the same servers you got a while before that.

Something like the smtp blackhole lists use could work for the reverse zone. Include an entry if the server is valid in the pool, like:

ipv4: 1.2.0.192.rev4.pool.ntp.org. in a 127.0.0.1
ipv6: 1.2.3....8.b.d.0.1.0.0.2.rev6.pool.ntp.org in a 127.0.0.1

You would probably want to use a pretty long TTL and query interval for these (a day or two?), to keep the number of DNS queries at bay.

There are many ways to organize and use these values. There also seems to be an RFC on DNS black/whitelists: http://tools.ietf.org/html/rfc5782

One possible downside to having these in the DNS is the possibility for enumerating the list of valid pool servers by "walking" the v4 reverse zone, only 4 billion addresses to try... I don't know if that's a problem.

  Tapio
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to