Adding servers to the China zone

There is an enormous amount of totally “wild” clients arround. Generally I have seen a huge amount of traffic like that (I just copied the first several entries few minutes ago):

ntpdc> mo
remote address          port local address      count m ver code avgint  lstint
===============================================================================
119.147.159.5           8764 161.53.131.133   3825272 3 4    1f0      0       0
106.2.233.43           58085 161.53.131.133  20907303 3 4    1f0      0       0
1.82.184.22            10062 161.53.131.133  10270354 3 4    1f0      0       0
1.82.184.17            34729 161.53.131.133  11434538 3 4    1f0      0       1
36.111.130.57           4360 161.53.131.133    575889 3 4    1f0      7       1
221.181.34.204         54103 161.53.131.133    624369 3 4    1f0      5       1
106.2.233.41           39086 161.53.131.133   9392631 3 4    1f0      0       1
1.82.184.30             2090 161.53.131.133   3991797 3 4    1f0      0       1
124.116.245.14         21884 161.53.131.133   7505310 3 4    1f0      0       1
36.111.130.45          30168 161.53.131.133    934158 3 4    5f0      4       1
14.204.86.98           24602 161.53.131.133    480341 3 4    5f0      6       2
14.204.86.90           16389 161.53.131.133    339827 3 4    5f0      9       2
36.111.130.42           4799 161.53.131.133    373675 3 4    1f0      8       2
119.147.159.6           7009 161.53.131.133   4715482 3 4    1f0      0       2
36.111.130.9           14389 161.53.131.133    551624 3 4    5f0      6       2
111.8.8.230             3054 161.53.131.133    703111 3 4    1f0      4       2

I did make quite an extensive list in ipf when I was trying to battle it, excluding partially even whole subnets, however, I did not take care about it for some time, and there are now, e.g. several IPs with over 10 million requests average 0 seconds, 106.2.233.43 is now on 21 million avg 0 sec.

From relatively recently (second half of 2016 approx.) we (the Internet) have the huge new problem of IoT cameras and many routers from a series of producers having fixed initial root/admin passwords which have to be changed by the end-user. Which they do not, many are probably even not aware of this need. What happend is that there is new virus spread, which tries to log from IP to IP, one after another, searching for any connected equipment with the fixed root/admin passwords. (I see an enormous amount of this ‘telnet’/‘ssh’ trying on my servers, which also sometimes influences the NTP servers availability.) After logging into such a (mostly) internet camera or home router, the Virus can install itself and any other software it likes (because the basis of probably all of that equipment is BusyBox).

Though I have no proof, I have a strong feeling that the enormous, tens of millions of times in a row, amount of NTP requests comes primarily from that equipment (and there are millions of such unprotected IoTs arround!), as I never before last year saw something like that.

The China zone is full of such misbehaving equipment, i tracerouted some of the incoming requests.

Presently my China zone server copes reasonably well (http://www.pool.ntp.org/scores/161.53.131.133), but you can see regular drops at certain times. However, I would not say that I would have any connectivity problems, as the internal network is multiple 100Mb/s and the external connection is 2 * 2 Gbit/s (if not upgraded last several years) (Rudjer Boshkovich Institute, Zagreb, Croatia). This server is a SunFire X4100 (2 * dual AMD Opteron, 2 GHz), Solaris 10. [About what Avij said about “even slower servers” I posted some time ago about my Sun 3/60 (MC68020+68881, 20MHz, 24MiB RAM), SunOS 4.1.1 acting already for years as part of ntp pool, and my web server (http://grgur.irb.hr/) :slight_smile:]

1 Like