Hello, I’m the operator of Pool Server 106.187.50.120. This server was set to a “Netspeed” of “20 Mbps”, previously it received little traffic, and recently joined the effort to improve the NTP availability in China. Since join, there’s a slight increase of traffic, the actually traffic was consistently around 4 Mbps and running without issues for months.
Around 2017-02-23 12:36 UTC, a great increase of traffic (70 Mbps!) is observed.
and my provider, Linode, blackholed my IP address at once. They told me the traffic was like this:
It looks to be an NTP flood. Here is a sample tcpdump for your reference:
07:36:02.199255 IP 101.17.121.231.55412 > 106.187.50.120.123: NTPv3, Client, length 48
07:36:02.199467 IP 106.187.50.120.123 > 101.17.121.231.55412: NTPv3, Server, length 48
07:36:02.199778 IP 123.122.71.216.47191 > 106.187.50.120.123: NTPv3, Client, length 48
07:36:02.200328 IP 121.235.18.239.38556 > 106.187.50.120.123: NTPv4, Client, length 48
07:36:02.200385 IP 106.187.50.120.123 > 123.122.71.216.47191: NTPv3, Server, length 48
07:36:02.200676 IP 106.187.50.120.123 > 121.235.18.239.38556: NTPv4, Server, length 48
07:36:02.200703 IP 52.69.160.127.123 > 106.187.50.120.123: NTPv4, Client, length 48
07:36:02.201126 IP 106.187.50.120.123 > 52.69.160.127.123: NTPv4, Server, length 48
07:36:02.201925 IP 1.199.74.35.8986 > 106.187.50.120.123: NTPv4, Client, length 48
07:36:02.202051 IP 106.187.50.120.123 > 1.199.74.35.8986: NTPv4, Server, length 48
07:36:02.203584 IP 1.82.184.29.46122 > 106.187.50.120.123: NTPv4, Client, length 48
07:36:02.203816 IP 106.187.50.120.123 > 1.82.184.29.46122: NTPv4, Server, length 48
07:36:02.204172 IP 106.45.215.129.38066 > 106.187.50.120.123: NTPv3, Client, length 48
07:36:02.204476 IP 106.187.50.120.123 > 106.45.215.129.38066: NTPv3, Server, length 48
07:36:02.204644 IP 113.200.107.217.10163 > 106.187.50.120.123: NTPv3, Client, length 48
07:36:02.204818 IP 106.187.50.120.123 > 113.200.107.217.10163: NTPv3, Server, length 48
and
The NTP traffic doesn’t look spurious, that is it doesn’t look like an amplification attack, but it came in an extraordinarily high volume.
So it looks like ordinary clients all cross China?! Look those outdated NTPv3 packets, is it possible to indicate my Pool Server is hardcoded by some ISPs, or embedded manufacturers? I’m so afraid of that…
Or it is just a trivial abuse of NTP Pool servers?
What should I do?