Frank Kardel wrote:
[EMAIL PROTECTED] (Luc Pardon) writes:
   Needless to say, "tcpdump -i eth1 port ntp" (eth1 being fd 51) doesn't show 
activity that might be related to the refusals.
I suspect that icmp messages (probably port unreachable) being received. So try 
"tcpdump -i eth1 port ntp or icmp" and see whether
such icmp messages show up and who sends them.

   Bang, spot on!

The culprit is ntp1.belbone.be, sending icmp packets to my box for whatever reason.

The interesting thing is, this server is not in my ntp.conf. It was in there - for a short time - a few days ago. But as best I can tell it was not in there when the "refused" messages started on Sept 2. His brother, ntp2.belbone.be, has been there all the time, but has a different IP.

Of course this got me wondering if ntp1.belbone.be is the only culprit. You'll remember that, while I still had ntp 4.2.0 installed, the "connection refused" messages showed not 0.0.0.0 but several different IP's, including internal ones.

   As it turns out, 4.2.0 is plain wrong.

I briefly reverted to ntp 4.2.0 and it seems to show a left-over IP from the previous packet exchange.

For example, I see a normal udp/123 query/response to/from the ntp server at IP 195.13.1.153 (ntp2.belbone.be). Then, 24 seconds later, comes the next icmp packet from ntp1.belbone.be. It's IP is 195.13.23.5 but the syslog entry has the ntp2.belbone.be IP:

Sep 11 09:26:44 gida ntpd[30638]: recvfrom(195.13.1.153) fd=9: Connection 
refused
Sep 11 09:26:44 gida ntpd[30638]: recvfrom(195.13.1.153) fd=9: Connection 
refused

Same for other icmp's. If it comes right after an incoming time query from one of the internal clients, that client's internal IP is what shows up in syslog.

So, this (reporting the wrong source) was a bug in 4.2.0 that is now more or less fixed in 4.2.3p39.

I say more or less because I still think that ntpd should at least display the correct IP, i.e. 195.13.23.5 instead of 0.0.0.0. If I had seen all the "refused"s coming from a single IP I might have tcpdumped all the traffic to/from that IP and I might have seen the icmp's.

In fact, I would expect this packet to be ignored, if only because of the "restrict default ignore", no?

Finally, the message is logged twice. Once would have been enough to flood my logs <g>.


  Bottom line, my conclusions for now are:

1) the problem seems external, probably something is broken at ntp1.belbone.be.

2) improvement in ntpd's logging could have saved me many hours of debugging (conclusion, not criticism)

3) to make this stop (i.e. keep the message out of my logs), I can only firewall him out (and contact the operator - if he's listening on tcp/25 <g> - but I'm not sure what to tell him).

4) there is nothing I can do at this point to prevent this from happening in the future.

   Please correct me if I'm wrong.

   Any light that can be shedded on the 'why' of this would be welcome too.

   Thanks for all the help.

   Luc

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to