Feeds

D-Link accused of 'killing' time servers

Time to stop freeloading

Securing Web Applications Made Simple and Scalable

Networking manufacturer D-Link is facing an escalating row over how its kit queries internet time servers.

Critics claim the way D-link equipment polls NTP (Network Time Protocol) servers is impairing their operations, leaving operators to carry unsustainable excess bandwidth charges. NTP servers handle a variety of functions including, for example, helping to create a record of the timing of eBay bids.

The row kicked off after self-confessed "time geek" Poul-Henning Kamp wrote an open letter to D-Link prompted by his frustrations in attempting to get the firm to acknowledge that a misconfigured implementation of NTP on its kit left him staring at a bill of around $8,800 a year. D-Link products worldwide query a small NTP server located at the Danish Internet Exchange, intended to service only 2,000 or so organisations in the country. Kamp reckons that between 75 and 90 per cent of the traffic hitting his servers comes from D-Link devices. Growing costs have forced Kamp to consider abandoning his time-keeping service.

The address of Kamp's NTP server - which is run on a non-profit basis and allocated only minimal bandwidth resources - was hardwired into the firmware in various D-link products. A more flexible approach would have seen the products reconfigured remotely and redirected to a more appropriate NTP server.

Kamp asked D-Link to take steps to reduce the impact of the problem. Acknowledging that a complete fix wasn't possible (because the "bad" bahaviour of D-Link's routers, switches and wireless access point was established by default configurations), Kamp asked D-Link to cover his excess costs. Since Kamp's open letter other NTP operators have come forward with similar complaints.

D-Link is freeloading onto as 50 NTP time servers, critics claim. The BBC reports that US military Nasa and government groups worldwide are running NTP servers interrogated by D-Link kit.

Security expert Richard Clayton, from the security research lab at Cambridge University, who first tracked back the source of unwanted international traffic sent to Kamp's Danish NTP server to D-Link kit, reckons D-Link would rack up $1,000 a month in bandwidth charges if it ran those time servers itself.

D-Link, for its part, is hiding behind its lawyers. Instead of acknowledging it might have made an error, and operators say D-Link's attorneys have accused them of "extortion" or else demanded that disgruntled punters submit to Californian law.

A D-Link spokesman said the firm was aware of the issue but said it wasn't prepared to discuss complaints publicly until its "legal counsel advises on the matter". D-Link may come up with a statement after Easter, El Reg was told. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.