At 3:56 PM +0930 2005-09-13, Darryl Ross wrote:

 I'm not sure whether Miroslaw was talking about tcp-wrappers or not, but
 a better solution might be to make ntpd aware of a file on disk (perhaps
 a hash like postfix uses for lookups) that contains an IP address (or
 classless blocks with mask) per line and it can internally do a lookup
 to see whether to respond to the client or not.

I don't think that trying to build this functionality into ntpd is the way to achieve this goal. The program is bloated enough as it is.

But, if you wanted to go this route, you could always being it up at the NTP IETF Working Group.

     Oh?  How many cisco routers do you think do e-mail?  How many SOHO
 router/gateways/access points do you think do e-mail?  Take a look at
 every single device on the entire Internet around the world, and then
 realize that most of those devices can (and should) use and/or serve
 NTP.  Relatively few of them will do e-mail.

 And absolutely none of them would ever need to look-up the blacklist.

 You said it yourself, they should be *using* ntp, not *serving* ntp.

Go back to that list again. Any or all of them can, and arguably should, be doing NTP both as client *and* as server.

For a home user, it's much better if their NAT/firewall/router/gateway/access point does NTP in a mostly guaranteed correct fashion, and then turns around and serves that time locally to all the clients. These people wouldn't need to be using the black list, unless an attacker was going after their server/network.

While the probability that any one given SOHO server might be under attack is fairly low, the probability that Linksys or DLink are guaranteed to have a significant number of customers under attack at any one time is pretty high. So, it makes perfect sense that they would want to extend their existing firewall capabilities to include the use of such a black list.


For a larger network, one of the most scalable ways to distribute time across all clients is to set up the routers to act as broadcast NTP servers. You don't want to set them up as unicast servers (see <http://ntp.isc.org/bin/view/Support/DesigningYourNTPNetwork#Section_5.6.>), but setting them up as broadcast servers is likely to work well.

But any one of those broadcast servers could potentially be abused by any given client, and if you're talking about using this facility at a large ISP, then certainly a black list of the sort we're talking about could be very useful.


Moreover, anyone with a server on the public Stratum-1 or Stratum-2 lists underneath the page at <http://ntp.isc.org/bin/view/Servers/WebHome> would also be a perfectly valid candidate to use a black list of this sort.

Indeed, anyone running an NTP server anywhere in the world would be a valid candidate. And that's a much bigger client base than just the pool.

 Why does it matter if it's local, especially if it's some sort of bdb
 and not actually stored in memory?

Because the way ntpd works is to lock everything in memory, so that it can guarantee that it never gets paged or swapped out, and that it never, ever has to hit the disk again. Moreover, in an embedded system, this is the *only* option -- there is no disk to hit.

Tying something like ntpd into an on-disk database is absolutely anethema to everything that NTP is trying to do. Do that with other programs if you want, but not ntpd.

     When a user goes to the web page to see why he's being blocked, that
 would need to be done against the database.  When they file their
 complaint with the help desk, there would need to be a response within a
 reasonable period of time, and when the help desk staffers go to look
 into the problem in more depth, they'd need to be able to query the
 database as well.

 You're assuming that people will even know they've been blacklisted.

Many people won't, but crackers will certainly be able to detect that. And then they will start attacking the infrastructure that provides whatever black list or other facilities that are preventing them from getting to their target.

Oh, and then there are the legal issues. The moment you start running a black list, you open yourself up to legal attack from every weirdo on the 'net. And you have to have the lawyers on retainer, and be willing and able to pay them large sums of money if you should happen to come under sustained legal attack.

--
Brad Knowles, <[EMAIL PROTECTED]>

"Those who would give up essential Liberty, to purchase a little
temporary Safety, deserve neither Liberty nor Safety."

    -- Benjamin Franklin (1706-1790), reply of the Pennsylvania
    Assembly to the Governor, November 11, 1755

  SAGE member since 1995.  See <http://www.sage.org/> for more info.
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to