Re: [chrony-users] NTS dropped packets

[ Thread Index | Date Index | More chrony.tuxfamily.org/chrony-users Archives ]


On Tue, Dec 01, 2020 at 12:44:10AM -0800, Hal Murray wrote:
> 
> > Some major network operators are blocking or rate limiting NTP packets as a
> > mitigation against the ntpd mode-6 amplification attacks. In some networks it
> > specifically applies to longer NTP packets.
> 
> What makes this case interesting is that the length test seems backwards.  
> Long packets work.  After the first 3 requests get dropped, the 4th request 
> has 3 extra dummy cookies in the packet.  That seems to make it big enough to 
> get through.

I think someone made this observation before and there was an
explanation that the filter was trying to catch specific mode-6/7
packets that were exploited in the amplification attacks.

-- 
Miroslav Lichvar


-- 
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx 
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx 
with "help" in the subject.
Trouble?  Email listmaster@xxxxxxxxxxxxxxxxxxxx.


Mail converted by MHonArc 2.6.19+ http://listengine.tuxfamily.org/