Hi, Danny. I can understand your point of view. Nevertheless, I don't have an usenet account and the process to send messages via "[email protected]" is moderated and is a bit slow and unpredictable. Sometimes it takes hours, sometimes it takes days to get the message to the group.
I needed to be sure the message would arrive soon. Google gmail is very reliable and gives free access to the usenet. Actually, I do not see it as unacceptable, as it would be possible to verify the authenticity of the message by other means (consulting the IPs, for example, or asking). But, sure, I would feel much more comfortable if sending the message from nic.br. Anyway, thank you for your message and feedback. I will do everything possible to find a better solution for usenet access. If any doubt remained about the authenticity of the message, it was authentic. The survey was actually conducted by NIC.br. The current stage of data collection ended on 26/12. There was a preliminary gathering between 02 and 04 December, and the main collection was taken between 12 and 26 December. We had about 240 thousand responses in "ntpdate" and 170 thousand in "ntpq -c rl" and "ntpq -p". We actually visited 1,141,065 possible ntp servers of a total of 2,516,029 IPs found (on monlist). I'd like to take this opportunity to thank the collaboration of all. We are analyzing the data and will soon publish some results. Best regards, -- Antonio M. Moreiras. Brazilian Network Information Center - NIC.br moreiras at nic.br http://nic.br/english/index.htm http://ntp.br Danny Mayer escreveu: > Antonio, > > If you are really from nic.br please use your email address from that > domain. It is unacceptable to use a gmail account for such notifications. > > Danny > > Antonio M. Moreiras wrote: >> Aiming to collect and analyze data from NTP network, a survey will be >> held at all hosts available for public access on the NTP network, >> using a program developed for this purpose. The survey will start >> today and will last some days. >> >> We plan to make this a permanent study, repeating the survey >> periodically. >> >> The program run the following commands: >>> ntpq -n -c pe -c rl <IP ADDRESS> >>> ntpdate -q <IP ADDRESS> >>> ntpdc -n -c monlist <IP ADDRESS> >> Related work can be found at: >> >> http://www.ntpsurvey.arauc.br/ >> http://www.media.mit.edu/~nelson/research/ntp-survey99/ >> >> The addresses that will make the collection are the 200.160.1.102 (ntp- >> survey.ceptro.br) and 200.160.7.193 (monitor.ntp.br) belonging to >> NIC.br (Núcleo de Informação e Coordenação do Ponto br). Some inicial >> tests were already made from 200.160.1.77 (dubai.ceptro.br). >> >> If you notice any consultation on your NTP server, don´t be worried: >> the data is for statistical purposes only. As all hosts running NTP >> are potentially NTP servers, you can notice packets sent to the IPs of >> NTP clients also. This research doesn´t undermines your network >> security. The collection is unrelated to the purpose of exploiting any >> security breach of NTP servers. >> >> If you do not want your network to be searched, contact us by email >> ntp at nic.br, and let us know what IP or IP range should not be >> consulted. Fell free to contact us also for more information, >> criticisms, sugestions or comments. >> >> The findings will be made available on http://www.ntp.br. >> >> Best regards, >> -- >> Antonio M. Moreiras. >> Brazilian Network Information Center - NIC.br >> moreiras at nic.br >> http://nic.br/english/index.htm >> http://ntp.br > _______________________________________________ questions mailing list [email protected] https://lists.ntp.org/mailman/listinfo/questions
