Quoting Ralf Hildebrandt who wrote on Mon 2016-10-17 at 10:54:

> I received an abuse complaint today, 213.239.204.119 is/was memeber of
> pool.ntp.org.

I both run a pool server and am active with network security monitoring.
A lot of the tooling for network security monitoring sees an active pool
ntp server as an outlier. Every unique request to the ntp server causes a
separate netflow log entry.

The big change that made the 'ntp ddos' alerts stop for the pool server was
making a difference in the size of the ntp answers so monlist (abused for
ddos) entries can be differentiated from normal ntp answers.

> > ##########################################################################
> > #              Portscan detected from host 213.239.204.119               #
> > ##########################################################################
> > 
> > time                protocol src_ip src_port          dest_ip dest_port
> > ---------------------------------------------------------------------------
> > Sun Oct 16 23:26:18 2016 UDP 213.239.204.119 123   =>     49.9.253.77 48943
> > Sun Oct 16 23:25:07 2016 UDP 213.239.204.119 123   =>    49.9.173.110 53789
[..]

This isn't even netflow based, this is simple network traffic checking
which does not even see that each of those packets is in response to an
earlier request.

"Working as designed" and with normal ntp ratelimits this can't be abused
for ddos attacks.

But this isn't an answer that you can give your local abuse department,
they need some insight to what you are doing on their network and why this
causes some misguided complaints.

                                          Koos van den Hout

-- 
The Virtual Bookcase, the site about books, book   | Koos van den Hout
news and reviews http://www.virtualbookcase.com/   | http://idefix.net/
PGP keyid 0x5BA9368BE6F334E4                       | IPv6 enabled!

Attachment: signature.asc
Description: Digital signature

_______________________________________________
pool mailing list
pool@lists.ntp.org
http://lists.ntp.org/listinfo/pool

Reply via email to