r3 - 2011-04-30 - 19:35:12 - HarlanStennYou are here: NTP >  Dev Web > ClockAlgorithms
NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p10 was released on 21 March 2017. It addresses 6 medium- and 5 low-severity security issues, 4 informational security topics, 15 bugfixes, and contains other improvements over 4.2.8p9.

Please see the NTP Security Notice for vulnerability and mitigation details.

Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.

Clock Algorithms

Interested in the clock algorithms used by NTP?

Please check out Computer Network Time Synchronization, The Network Time Protocol on Earth and in Space (2nd edition), by David L. Mills.

In particular, the following references should be most valuable. If you find (links to) on-line versions of any of these, please add those links:

In an email message to the GSoC2011 students who are studying NTP's clock algorithms, JudahLevine wrote:

The next step in clock algorithms is to understand what already exists. For that purpose, you should study and thoroughly understand the phase-lock-loop algorithm that was in the original recipe of NTP, and the frequency-lock algorithm that you can find in my papers and that was included in NTP starting with the first version 4, as I remember. Almost all of my papers are on line at the publications menu on http://tf.nist.gov. If you enter my name you will see a listing of all of my papers. The earliest one that is important here was published in about 1995 in the transactions on networking. That paper introduced the frequency loop principles. For background information, you could also look at my review article that appeared in the Review of Scientific Instruments in 1999. A lot of this stuff is also in David Mills' book, and there is probably lots of other stuff out there that I don't know about.
Edit | WYSIWYG | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r3 < r2 < r1 | More topic actions
 
SSL security by CAcert
Get the CAcert Root Certificate
This site is powered by the TWiki collaboration platform
IPv6 Ready
Copyright & 1999-2017 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback