Aiming to collect and analyze data from NTP network, a survey will be held at all hosts available for public access on the NTP network, using a program developed for this purpose. The survey will start today and will last some days.
We plan to make this a permanent study, repeating the survey periodically. The program run the following commands: > ntpq -n -c pe -c rl <IP ADDRESS> > ntpdate -q <IP ADDRESS> > ntpdc -n -c monlist <IP ADDRESS> Related work can be found at: http://www.ntpsurvey.arauc.br/ http://www.media.mit.edu/~nelson/research/ntp-survey99/ The addresses that will make the collection are the 200.160.1.102 (ntp- survey.ceptro.br) and 200.160.7.193 (monitor.ntp.br) belonging to NIC.br (Núcleo de Informação e Coordenação do Ponto br). Some inicial tests were already made from 200.160.1.77 (dubai.ceptro.br). If you notice any consultation on your NTP server, don´t be worried: the data is for statistical purposes only. As all hosts running NTP are potentially NTP servers, you can notice packets sent to the IPs of NTP clients also. This research doesn´t undermines your network security. The collection is unrelated to the purpose of exploiting any security breach of NTP servers. If you do not want your network to be searched, contact us by email ntp at nic.br, and let us know what IP or IP range should not be consulted. Fell free to contact us also for more information, criticisms, sugestions or comments. The findings will be made available on http://www.ntp.br. Best regards, -- Antonio M. Moreiras. Brazilian Network Information Center - NIC.br moreiras at nic.br http://nic.br/english/index.htm http://ntp.br _______________________________________________ questions mailing list [email protected] https://lists.ntp.org/mailman/listinfo/questions
