NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.Notes:
ntp-4.2.8p15was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Please see the NTP Security Notice for vulnerability and mitigation details.Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
| ServerForm | |
|---|---|
| ServerStratum | Inactive |
| CountryCode | NG |
| Hostname | ntp.supernet300.com |
| IP Address | 216.72.109.4 |
| IPv6 Address | |
| UseDNS | Yes |
| PoolMember | No |
| ServerLocation | Supernet300 |
| HostOrganization | |
| GeographicCoordinates | |
| ServerSynchronization | NTP secondary (stratum 2), PC/Linux |
| ServiceArea | Western Africa, primarily Nigerian NITEL backbone |
| AccessPolicy | OpenAccess |
| AccessDetails | |
| NotificationMessage | Yes |
| AutoKeyURL | |
| SymmetricKeyType | |
| SymmetricKeyURL | |
| ServerContact | timelords@supernet300.com |
Copyright &© 1999-2021 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback