I am currently being bombed by 193.170.124.119 (lehre.fh-hagenberg.at).
It looks like a NAT router serving a lab full of systems trying desperately to get their time fix. It has started a few weeks ago, and I get millions and millions of queries from this single IP.

It seems to be a technical university in Austria. Their IT seems to be outsourced. I have sent several complaints to addresses I could find in whois and on their website, and also information queries (who do I contact for abuse from your systems) to their
generic mail addresses, but there is zero, nada, no reply.  It just goes on.

I have blocked them, rejected their packets with ICMP, sent them KoD replies, but no
difference at all.

What I don't really understand is why it is so persistent and severe. One would expect that after some time they would pickup another address from the pool and bug that one. It would require a clueless person to configure a fixed address from the pool as a destination for all their NTP packets via NAT, and then not monitor the result (after all,
they have not received a valid reply from me for at least 3 weeks).

I would think someone who would want to setup an NTP environment for a large number of computers would study the matter enough to know not to setup a static address from the pool, and that it would be better to setup a local server for the clients and have only
that single server sync to the external world...

Rob
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to