• English
  • Japanese

Attention: NTPD DDoS Amplification Attacks

January 15, 2014
To Users of SFC-CNS/ERNS
Shonan Fujisawa ITC
NTPD DDoS Amplification Attacks

Recently, we have found DDoS (Network Amplification) attacks using the vulnerability of Network Time Protocol Daemon (NTPD).

NTPD has a monlist function for server administration and this function causes severs to return a massive response. If access to this function is not restricted appropriately, NTPD host on-campus has potential to be used as relay host of such DDoS attacks.

Please refer to below sites and set to NTPD appropriately.

If we find such attacks to outside, we will terminate the network connection without prior notice. Thank you for your understanding and patience.

Last-Modified: January 15, 2014

The content ends at this position.