http://arstechnica.com/security/2014/01 ... ps-floods/
http://web.nvd.nist.gov/view/vuln/detai ... -2013-5211
It's hurting my clients too.
Please make sure you are not a ntp amplifier.
You may have to rebuild ntp.
Edited for additional review on this topic:allfox wrote: Is there any way to configure the full NTP daemon to reply local queries only? Pi has no hardware clock to maintain time accuracy, so I think a constant running daemon is a must for a Pi server.
This solution is cool, I didn't know the cron.hourly magic at all. I just made a link to /etc/network/if-up.d/ntpdate in cron.weekly.ripat wrote:I always avoid running unnecessary daemon on my *nix boxes. I never used the ntp daemon for that reason. It uses memory and continuously listen on its ports for UDP queries.
If you only need to sync the RPi's clock, ntpdate in more than enough. It is run from the /etc/network/if-up directory waiting for an interface to come up before syncing. You can also copy that script in the /etc/cron.hourly if you really need to update more frequently. The drift rarely exceed 1/10th of a second which is acceptable to me. The average drift on 800 hourly adjustments is -0,07 sec. on one of my RPi's.
A weekly sync is going to be quite a bit of drift; 10 seconds or so. This matters if you're synching with remote file systems.allfox wrote:… I just made a link to /etc/network/if-up.d/ntpdate in cron.weekly.
I guess I can do nothing to eliminate the possibility of being attacked. It's just human nature to hit someone when he has a weapon. I could only prey to the god of education and law. But before the god get noted, I'll try to make my machines not being used to hit other people.birdwes wrote:You can get attacked, even if you are not running ntpd, or firewalled off. Wireshark will prove this if your big Linux box is a multi-homed router.
The attack will simply consume most of your bandwidth, and deny some of mine if you have an open ntp port on a pre .26 version.
Yes, all firewalled routers will see the ntp UDP queries coming and drop|reject them as they arrive. Even if you have a ntpd server behind it, these packets will never go through and will remain unanswered, removing the Amplified part of the ADRDOS (Amplified Distributed Reflective Denial of Service). So, I don't see how it can consume so much bandwidth. Our firewalls continuously receive packets of all sorts sent by Script Kiddies and Scanner Monkeys.birdwes wrote:You can get attacked, even if you are not running ntpd, or firewalled off. Wireshark will prove this if your big Linux box is a multi-homed router.
The attack will simply consume most of your bandwidth, and deny some of mine if you have an open ntp port on a pre .26 version.
Note that pipex were taken over by tiscali (who were later taken over by talktalk) and at least round here they quietly migrated users to tiscali LLU (and broke my parents internet connection in the process), so afaict if you keep using them you are paying pipex prices for tiscali/talktalk service quality.birdwes wrote: My Client uses 4 ISPs: Demon, Pipex, Zen, Eclipse. The theory being that if one goes down they can continue.
Indeed, I think your client is foolish. IMO to get any significant benefit from having more than two broadband serivces they need to be on different infrastructure (so virgin media cable+BT wholesale ADSL+LLU ADSL+cellular would be a good combination if you can get it)That is until pikies got a Land Rover and stole half a mile of the copper.