[189241] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: NIST NTP servers

daemon@ATHENA.MIT.EDU (Harlan Stenn)
Wed May 11 23:05:30 2016

X-Original-To: nanog@nanog.org
From: Harlan Stenn <stenn@ntp.org>
To: Sharon Goldberg <goldbe@cs.bu.edu>
In-reply-to: <CAJHGrrQvxDLHYMWC28CGHSXxkowXcM3W+JrTNXhr8q8i0Byh5g@mail.gmail.com>
Date: Thu, 12 May 2016 03:04:07 +0000
Cc: Florian Weimer <fw@deneb.enyo.de>,
 North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Sharon Goldberg writes:
> Well, if you really want to learn about the NTP servers a target is using
> you can always just sent them a regular NTP timing query (mode 3) and just
> read off the IP address in the reference ID field of the response (mode 4).

Unless the server is an IPv6 server.  This trick only works for IPv4.

And we have a fix for all of this that will be out soon.
-- 
Harlan Stenn <stenn@ntp.org>
http://networktimefoundation.org - be a member!

home help back first fref pref prev next nref lref last post