[Ntp] Another sample of NTP filtering

Hal Murray <halmurray+ietf@sonic.net> Fri, 14 January 2022 04:00 UTC

Return-Path: <halmurray+ietf@sonic.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F2D73A18C9 for <ntp@ietfa.amsl.com>; Thu, 13 Jan 2022 20:00:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UFa6GHUlBrNb for <ntp@ietfa.amsl.com>; Thu, 13 Jan 2022 20:00:55 -0800 (PST)
Received: from c.mail.sonic.net (c.mail.sonic.net [64.142.111.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5FCC33A18C6 for <ntp@ietf.org>; Thu, 13 Jan 2022 20:00:55 -0800 (PST)
Received: from 107-137-68-211.lightspeed.sntcca.sbcglobal.net (107-137-68-211.lightspeed.sntcca.sbcglobal.net [107.137.68.211]) (authenticated bits=0) by c.mail.sonic.net (8.16.1/8.16.1) with ESMTPSA id 20E40sAe005170 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Thu, 13 Jan 2022 20:00:54 -0800
Received: from hgm (localhost [IPv6:::1]) by 107-137-68-211.lightspeed.sntcca.sbcglobal.net (Postfix) with ESMTP id 1189228C1BF; Thu, 13 Jan 2022 20:00:54 -0800 (PST)
X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.7.1
To: ntp@ietf.org
cc: Hal Murray <halmurray+ietf@sonic.net>
From: Hal Murray <halmurray+ietf@sonic.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Thu, 13 Jan 2022 20:00:54 -0800
Message-Id: <20220114040054.1189228C1BF@107-137-68-211.lightspeed.sntcca.sbcglobal.net>
X-Sonic-CAuth: UmFuZG9tSVaZa063jYsSpAQPo7Cpz0dbABUmxib3RLdgRz8WJeW8FIG+7JHayNzri2wFLmBvBaaDou88SuJk26+h2uaGJa+fInr6kj1h1CM=
X-Sonic-ID: C;SCX/ke507BGCLwqerbZk0g== M;HgIuku507BGCLwqerbZk0g==
X-Sonic-Spam-Details: -1.5/5.0 by cerberusd
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/Eg8ZAcfuRqxZBFWqHJUeQSXa0D8>
Subject: [Ntp] Another sample of NTP filtering
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2022 04:00:58 -0000

I have a couple of servers in the pool.  I've been testing shared key 
authentication to my home, RFC 4493, 68 bytes

One stopped working Dec 26.  The other stopped Dec 30.

Both are working without authentication, 48 bytes.
IPv6 works with authentication.


-- 
These are my opinions.  I hate spam.