NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15
was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
The
NTP Project uses the following Black Lists to reduce the amount of spam delivered through our mail-server:
- blackholes.easynet.nl
- http.dnsbl.sorbs.net
- socks.dnsbl.sorbs.net
- proxies.blackholes.easynet.nl
- dnsbl.njabl.org
- sbl.spamhaus.org
- zombie.dnsbl.sorbs.net
- misc.dnsbl.sorbs.net
- dnsbl.sorbs.net
- relays.ordb.org
- osrs.bl.reynolds.net.au
- osps.bl.reynolds.net.au
- ohps.bl.reynolds.net.au
- opm.blitzed.org
- web.dnsbl.sorbs.net
- relays.visi.com
- cbl.abuseat.org
- rdts.bl.reynolds.net.au
- omrs.bl.reynolds.net.au
- list.dsbl.org
- multihop.dsbl.org
Please contact
postmaster@ntp.org if you have any questions about our Black Lists. In addition, if you have any suggestions for black lists that are not shown above, please let us know.
Settings:
Set ALLOWTOPICCHANGE =
NtpPublicServicesProjectStaffGroup