peterle
Forenkasper
Moien, Moien,
ich habe da einige abuse Meldungen bekommen, daß mein ntpd Mist machen würde:
Nun könnte ich mir das mit einer Standardeinstellung des ntpd noch vorstellen, aber mit einem restrict default und nur einer Freigabe für localhost nicht mehr.
Trotzdem bekomme ich scheinbar weiter diese Meldungen.
Was sind denn Eure besten Ideen dazu - ich bin langsam ratlos.
ich habe da einige abuse Meldungen bekommen, daß mein ntpd Mist machen würde:
Code:
You are running a public NTP server that participated a very large-scale at=
tack against a customer of ours today, generating UDP responses to spoofed =
requests with bogus timestamps that claimed to be from the attack target. Y=
our server was particularly active in the attack, sending a significant por=
tion of the attack traffic we saw.
Please consider reconfiguring your NTP server in one or more of these ways:
- Set your NTP installation to act as a client only. With ntpd, that can be=
done with "restrict default ignore" in /etc/ntp.conf; other servers should=
have a similar configuration option. A firewall rule to block UDP to the p=
ublic IP address on port 123 would also work for this. More information can=
be found here: https://www.team-cymru.org/ReadingRoom/Templates/secure-ntp=
-template.html
- Adjust your firewall or NTP server configuration so that it only serves y=
our customers and does not respond to outside IP addresses=20
- Rate-limit responses to individual source IP addresses, silently discardi=
ng those that exceed a low number, such as one request per IP address per s=
econd
- Limit queries to TCP-only
- Ignore particularly unlikely queries, such as those representing dates fa=
r in the future or past
- Limit the size of allowed responses; today's were 440 bytes, which were v=
ery large
Example NTP responses from your host during this attack are given below. Ti=
mes are CST (UTC-6), and the date is 2013-12-26.
23:27:05.618460 IP (tos 0x0, ttl 51, id 13194, offset 0, flags [none], prot=
o UDP (17), length 468) XXX.XXX.XXX.XXX.123 > YYY.YYY.YYY.YYY.123: NTPv2, length=
440
Reserved, Leap indicator: clock unsynchronized (192), Stratum 0, poll 3s, =
precision 42
Root Delay: 6.001098, Root dispersion: 0.000000, Reference-ID: (unspec)
Reference Timestamp: 0.000000111
Originator Timestamp: 1247507655.734990715 (2075/08/19 20:22:31)
Receive Timestamp: 1.001877248 (2036/02/07 01:28:17)
Transmit Timestamp: 0.000000000
Originator - Receive Timestamp: -1247507654.733113467
Originator - Transmit Timestamp: -1247507655.734990715
0x0000: 4500 01d4 338a 0000 3311 7d01 bc28 5a43 E...3...3.}..(ZC
0x0010: 4a5b 74c7 007b 007b 01c0 db92 d700 032a J[t..{.{.......*
0x0020: 0006 0048 0000 0000 0000 0000 0000 0000 ...H............
0x0030: 0000 01e0 4a5b 74c7 bc28 5a43 0000 0001 ....J[t..(ZC....
0x0040: 007b 0702 0000 0000 0000 0000 .{..........
Nun könnte ich mir das mit einer Standardeinstellung des ntpd noch vorstellen, aber mit einem restrict default und nur einer Freigabe für localhost nicht mehr.
Trotzdem bekomme ich scheinbar weiter diese Meldungen.
Was sind denn Eure besten Ideen dazu - ich bin langsam ratlos.