On 2/3/2014 2:46 PM, Dobbins, Roland wrote:
On Feb 4, 2014, at 12:11 AM, Brian Rak <b...@gameservers.com> wrote:

You can disable these quite easily, and still run a NTP server that provides 
accurate time services.
Concur 100% - although it should be noted that 1:1 reflection without any 
amplification is also quite useful to attackers.

That's true, but there are countless services out there that could be abused in 
such a way.  It's pretty much the same issue with DNS, even authoritative-only 
servers can be abused for reflection.  Securing everything that could possibly 
be used for reflection is going to be a long and painful process, preventing 
this specific amplification attack is pretty easy.

NTP clients have a long history of poor implementations, so the server already 
has rate limiting built in.  While rate limiting outgoing replies isn't a 
perfect solution, it's significantly better then no rate limiting (for the 
curious, add 'limited' to your 'restrict default' lines to enable rate 
limiting.  This doesn't help with the current amplification issues, but will 
help should someone just be abusing NTP servers for reflection).



Reply via email to