[168699] in North American Network Operators' Group
Re: TWC (AS11351) blocking all NTP?
daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Mon Feb 3 13:40:54 2014
To: "John Levine" <johnl@iecc.com>
In-Reply-To: Your message of "03 Feb 2014 18:23:31 +0000."
<20140203182331.8608.qmail@joyce.lan>
From: Valdis.Kletnieks@vt.edu
Date: Mon, 03 Feb 2014 13:38:58 -0500
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
--==_Exmh_1391452738_2701P
Content-Type: text/plain; charset=us-ascii
On 03 Feb 2014 18:23:31 +0000, "John Levine" said:
> It seems thata hosts sending large amounts of NTP traffic over the
> public Internet can be safely filtered if you don't already know that
> it's one of the handful that's in the ntp.org pools or another well
> known NTP master.
You have that backwards - you can (possibly) safely filter it if you
can establish *for certain* that it *isn't* in the ntp.org pools.
--==_Exmh_1391452738_2701P
Content-Type: application/pgp-signature
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
Comment: Exmh version 2.5 07/13/2001
iQIVAwUBUu/iQQdmEQWDXROgAQIBBQ/+MT62WRnsnkQYglsMbRzDZNnI5CVUB77j
aCPomzbu1TKYIFGttjvTqoXAW/kvPgAd2gATNUeMp4Uxk+H2j/aRv9KYiAEDBreS
zWGDvwPFQu7LAlJ2svSiygui3EIqyolROzmDbm/b9nF7zvYFmw5vl7roc3NfKltm
F+uw6mCdSL21YxwFD0VzFiCDyKqCOm0kcmXYkKUwhqZH896foIGtMADX+yVI4qrH
AX3xqKooha8V8CCWsxjDU5L5IHadkIHO0mP6IS8OBqpkDkdW9HgR/VGXrWlkMNCy
fGtQWODY2Gu6w2ZI5f2JUV5zbtLuSjQO8jA8FNXEPe4ax+aZ0PZhSAuukukhBRrz
r75VjM0sLbSE5ZwasQaeXn3+5uFK4QmSf7p6f5TLUxgOQICPZuYVISuHciBsKZN3
DLP04fHFEKjSYVCB0iw3u9il/O+erRSguOBPc2yueyHO9txFOoGO+E8x5btQ3suv
QIPLl0FMwUs6s7vu12PKiMX69cO3TzPJ9ApBfYHR/W8kcXZiqhlRr4vZdMqcekqG
UaYc/eT5aVnHXklA9kmnKPlKNHpipi4vdHubTmcqzQ7g61OVSNXl7ewbVtLmlhYX
XvnXTX8Pvjo0rNYGrjOiuA0J6/zdDtYjd5+bIVSkzNTVjmr2t/s0kAPPizSSi7Pp
wjXBSwq3JY8=
=T3uN
-----END PGP SIGNATURE-----
--==_Exmh_1391452738_2701P--