[top-posting damage repaired manually] >> A soon as the server is in the pool (the score is over 5.0) I am >> flooded with too many requests (more than 5000 in 1 second) that >> make the network fail. I do not think it is normal, how can I >> protect myself? > That very well could be normal, if there are not many other pool > servers near you.
It may very well be normal in the sense of normative, but even an unintentional DoS attack is still a DoS attack. I used to see similar things until I added monitoring at my boundary to detect and block ill-behaved pounders on my NTP server. Those who query my NTP daemon too frequently will find it simply stops responding. However, some of the pounders are so ill-behaved as to keep hammering away even long after being blocked. For example, the current worst offender I'm seeing is 70.67.40.245, which has been getting no responses since some time on 2009-07-06, but it's still pounding away, currently at about one packet every 2.656 seconds. /~\ The ASCII Mouse \ / Ribbon Campaign X Against HTML [email protected] / \ Email! 7D C8 61 52 5D E7 2D 39 4E F1 31 3E E8 B3 27 4B _______________________________________________ timekeepers mailing list [email protected] https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers
