[email protected] said: > I'd expect the server to respond to all requests it can or is configured to > (e.g. with rate limiting), like an NTP server normally does. Should it be > different with NTS?
Since it's reasonably easy to inject packets with forged source address, rate limiting is an opportunity for denial of service without sending a lot of traffic that might attract notice. If you want to keep a site from using NTP, just send enough requests "from" that site to all the NTP servers it might use. You only need to send enough traffic to keep the the rate limiting activated. -- These are my opinions. I hate spam. _______________________________________________ TICTOC mailing list [email protected] https://www.ietf.org/mailman/listinfo/tictoc
