[193043] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Recent NTP pool traffic increase

daemon@ATHENA.MIT.EDU (Dan Drown)
Thu Dec 15 22:10:02 2016

X-Original-To: nanog@nanog.org
Date: Thu, 15 Dec 2016 21:09:58 -0600
From: Dan Drown <dan-nanog@drown.org>
To: nanog@nanog.org
In-Reply-To: <D0A3DDFE-522A-4665-92FD-EAD7D1417E18@arbor.net>
Errors-To: nanog-bounces@nanog.org

Quoting Roland Dobbins <rdobbins@arbor.net>:
> Do you have flow telemetry, which provides a lot more information  
> than basic pps/bps stats?

Sources are pretty widely spread out among cell networks/home  
internet, seem to be mostly US based.  I'm not seeing a large amount  
of traffic per single IP or single subnet.  This seems more like  
"someone pushed out bad firmware" rather than something malicious.

> Are you seeing normal timesync queries, or lots of level-6/level-7  
> admin command attempts?

SNTP Client timesync queries make up 91.3% of the traffic to my server.

The following NTP settings being most the popular (47% of all traffic  
to my server):

stratum=0, poll=4, precision=-6, root delay=1, root dispersion=1,  
reference timestamp=0, originator timestamp=0,
receive timestamp=0


home help back first fref pref prev next nref lref last post