[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] Re: [Pool] shodan.io actively infiltrating ntp.org IPv6 pools for scanning purposes
From:       Asbjorn Hojmark <lists () hojmark ! org>
Date:       2016-01-29 7:33:52
Message-ID: 4DEA83BF-D7C9-40F2-AD63-BC9C9B3910AE () hojmark ! org
[Download RAW message or body]


> I might just be too cynical, but it also feels like something we should come to expect. \
> Anyone who's looked at traffic to an Internet facing IPv4 address have seen much worse.

I (too) might just be too cynical, or in this business too long, but I feel that if you \
communicate on the global Internet, you should expect to be probed. If you're not ready to be \
probed, your machine shouldn't be on the Net. Really.

One can probe the entire v4 Internet in minutes, so being probed should not be new to any \
device on it. The fact that the v6 address space takes ... slightly longer ;) to probe should \
not make one lazy and rely on security by obscurity, hoping that your machine will not be seen.

That being said, I do agree that the NTP pool should try to only provide the services that it \
‘advertises'. I just hope everyone realises that with volounteers running the servers and the \
pool, that will be very difficult to enforce.

-A=


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic