Hi, Danny.

I can understand your point of view. Nevertheless, I don't have an
usenet account and the process to send messages via
"[email protected]" is moderated and is a bit slow and
unpredictable. Sometimes it takes hours, sometimes it takes days to get
the message to the group.

I needed to be sure the message would arrive soon. Google gmail is very
reliable and gives free access to the usenet. Actually, I do not see it
as unacceptable, as it would be possible to verify the authenticity of
the message by other means (consulting the IPs, for example, or asking).
But, sure, I would feel much more comfortable if sending the message
from nic.br. Anyway, thank you for your message and feedback. I will do
everything possible to find a better solution for usenet access.

If any doubt remained about the authenticity of the message, it was
authentic. The survey was actually conducted by NIC.br. The current
stage of data collection ended on 26/12. There was a preliminary
gathering between 02 and 04 December, and the main collection was taken
between 12 and 26 December. We had about 240 thousand responses in
"ntpdate" and 170 thousand in "ntpq -c rl" and "ntpq -p". We actually
visited 1,141,065 possible ntp servers of a total of 2,516,029 IPs found
(on monlist).

I'd like to take this opportunity to thank the collaboration of all. We
are analyzing the data and will soon publish some results.

Best regards,
--
Antonio M. Moreiras.
Brazilian Network Information Center - NIC.br
moreiras at nic.br
http://nic.br/english/index.htm
http://ntp.br




Danny Mayer escreveu:
> Antonio,
> 
> If you are really from nic.br please use your email address from that
> domain. It is unacceptable to use a gmail account for such notifications.
> 
> Danny
> 
> Antonio M. Moreiras wrote:
>> Aiming to collect and analyze data from NTP network, a survey will be
>> held at all hosts available for public access on the NTP network,
>> using a program developed for this purpose. The survey will start
>> today and will last some days.
>>
>> We plan to make this a permanent study, repeating the survey
>> periodically.
>>
>> The program run the following commands:
>>> ntpq -n -c pe -c rl <IP ADDRESS>
>>> ntpdate -q <IP ADDRESS>
>>> ntpdc -n -c monlist <IP ADDRESS>
>> Related work can be found at:
>>
>> http://www.ntpsurvey.arauc.br/
>> http://www.media.mit.edu/~nelson/research/ntp-survey99/
>>
>> The addresses that will make the collection are the 200.160.1.102 (ntp-
>> survey.ceptro.br) and 200.160.7.193 (monitor.ntp.br) belonging to
>> NIC.br (Núcleo de Informação e Coordenação do Ponto br). Some inicial
>> tests were already made from 200.160.1.77 (dubai.ceptro.br).
>>
>> If you notice any consultation on your NTP server, don´t be worried:
>> the data is for statistical purposes only. As all hosts running NTP
>> are potentially NTP servers, you can notice packets sent to the IPs of
>> NTP clients also. This research doesn´t undermines your network
>> security. The collection is unrelated to the purpose of exploiting any
>> security breach of NTP servers.
>>
>> If you do not want your network to be searched, contact us by email
>> ntp at nic.br, and let us know what IP or IP range should not be
>> consulted. Fell free to contact us also for more information,
>> criticisms, sugestions or comments.
>>
>> The findings will be made available on http://www.ntp.br.
>>
>> Best regards,
>> --
>> Antonio M. Moreiras.
>> Brazilian Network Information Center - NIC.br
>> moreiras at nic.br
>> http://nic.br/english/index.htm
>> http://ntp.br
> 
_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.org/mailman/listinfo/questions

Reply via email to