[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

NIST NTP servers



On Wed, 11 May 2016 21:07:21 +0200, Florian Weimer said:
> * Chris Adams:
>
> > First, out of the box, if you use the public pool servers (default
> > config), you'll typically get 4 random (more or less) servers from the
> > pool.  There are a bunch, so Joe Random Hacker isn't going to have a
> > high chance of guessing the servers your system is using.
>
> A determined attacker will just run servers in the official pool.

Such attacks have allegedly been attempted against Tor by certain
very well funded adversaries.

Thus my statement that if you're seeing that scale attack on your time
sources, the fact that your time source is being attacked is the *least*
of your problems...
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 848 bytes
Desc: not available
URL: <http://mailman.nanog.org/pipermail/nanog/attachments/20160511/09c6fca7/attachment.pgp>