strawdog74
Dabbler
- Joined
- May 23, 2012
- Messages
- 42
I just rebooted my router, and noticed some worrying messages :-
Oct 12 10:13:35 freenas kernel: bge0: link state changed to DOWN
Oct 12 10:13:35 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:13:38 freenas kernel: bge0: link state changed to UP
Oct 12 10:13:57 freenas kernel: bge0: link state changed to DOWN
Oct 12 10:14:28 freenas ntpd[1596]: sendto(193.219.61.110) (fd=22): No route to host
Oct 12 10:14:38 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:14:42 freenas ntpd[1596]: sendto(77.245.18.26) (fd=22): No route to host
Oct 12 10:15:32 freenas ntpd[1596]: sendto(193.219.61.110) (fd=22): No route to host
Oct 12 10:15:43 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:15:45 freenas ntpd[1596]: sendto(77.245.18.26) (fd=22): No route to host
Oct 12 10:16:14 freenas kernel: bge0: link state changed to UP
Now, normally I would not be alarmed at the failure of an NTP route to host, but I checked the IP addresses above and none of them relate to the 3 x NTP servers I have setup on FreeNAS (I am using the standard freebsd.pool.ntp.org servers). The IP addresses above are all located in Lithuania & Estonia - another reason for me to worry, as I prefer to have no interaction with these countries. Also, I checked the web and found a vulnerability does exist with the NTP daemon (ntpd).
So, my questions are :-
- Why is my NTP daemon trying to "send" to the above IP addresses?
- Is there a valid reason that I need to have NTP daemon running?
- If not, how do I turn it off (as it seems like an unnecessary security risk)?
Oct 12 10:13:35 freenas kernel: bge0: link state changed to DOWN
Oct 12 10:13:35 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:13:38 freenas kernel: bge0: link state changed to UP
Oct 12 10:13:57 freenas kernel: bge0: link state changed to DOWN
Oct 12 10:14:28 freenas ntpd[1596]: sendto(193.219.61.110) (fd=22): No route to host
Oct 12 10:14:38 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:14:42 freenas ntpd[1596]: sendto(77.245.18.26) (fd=22): No route to host
Oct 12 10:15:32 freenas ntpd[1596]: sendto(193.219.61.110) (fd=22): No route to host
Oct 12 10:15:43 freenas ntpd[1596]: sendto(193.40.133.142) (fd=22): No route to host
Oct 12 10:15:45 freenas ntpd[1596]: sendto(77.245.18.26) (fd=22): No route to host
Oct 12 10:16:14 freenas kernel: bge0: link state changed to UP
Now, normally I would not be alarmed at the failure of an NTP route to host, but I checked the IP addresses above and none of them relate to the 3 x NTP servers I have setup on FreeNAS (I am using the standard freebsd.pool.ntp.org servers). The IP addresses above are all located in Lithuania & Estonia - another reason for me to worry, as I prefer to have no interaction with these countries. Also, I checked the web and found a vulnerability does exist with the NTP daemon (ntpd).
So, my questions are :-
- Why is my NTP daemon trying to "send" to the above IP addresses?
- Is there a valid reason that I need to have NTP daemon running?
- If not, how do I turn it off (as it seems like an unnecessary security risk)?