[nsp-sec] NTP reflection attacks

SURFcert - Peter p.g.m.peters at utwente.nl
Wed Jan 15 03:27:59 EST 2014


Phil,

Phil Rosenthal wrote on 15-01-2014 05:57:

> Just a heads up.  We are now starting to see a new type of attack on
> downstream customers, with NTP monlist directed at an open chargen.

I have seen this with a twist. In our case it was not against an open
NTP monlist server but the regular NTP server. So not really much of an
amplification but overall a whole lot higher load on the server and the
network.

-- 
Peter Peters                     /------\           SURFnet bv
SURFcert                         | SURF |           cert.surfnet.nl
cert at surfnet.nl                  \-----\ \-----\    Postbus 19035
PGP Key ID 0x5A52C966                   | CERT |    NL-3501 DA  Utrecht
+31 30 2305 305                         \------/    fax: +31 30 2305 329

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 455 bytes
Desc: OpenPGP digital signature
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20140115/b96c4133/attachment-0001.sig>


More information about the nsp-security mailing list