NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15
was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Release Issues
The next release will be 4.2.1, which is waiting on:
Fixing the last Multicast bugs
To our knowledge in the current ntp-dev:
- IPv4 broadcast and multicast work on all known Unix systems
- IPv4 broadcast works on Windows systems
- IPv6 multicast client is known to work on Solaris
- IPv6 multicast client is known to work on FreeBSD
- IPv6 multicast server is known to work on FreeBSD
- IPv4 multicast works on Windows systems with authentication disabled
- IPv4 multicast fails on Windows systems with authentication enabled
--
DannyMayer - 29 Jun 2005
Multicast Status Chart
If you are using or have tested a multicast client
using the current ntp-dev, please add it to this chart or
add a comment below or e-mail your comment to
webmaster@ntp.isc.org.
Making sure IPv6 is working
DannyMayer believes IPv6 is working everywhere where IPv6 is supported except under Windows (using
ntp-dev
).
If you disagree, please let us know.