NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to use in a distributed denial-of-service (DDoS) attack. Please also take this opportunity to defeat denial-of-service attacks by implementing ingress and Egress filtering through BCP38.
A new set of mode 6 vulnerabilities has been discovered and, while these vulnerabilities can be reduced by making sure you have
restrict default … noquery in your
ntp.conf file, the best and most complete way to avoid these vulnerabilities is to install and deploy
ntp-4.2.8 which was released on 18 December 2014.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Network Code Wizards Wanted
The NTP Project needs more networking code wizards - the current set of volunteers are swamped.
We need help with IPv4 and IPv6, on both Unix and Windows, to help with a number of issues, including some that are blocking the 4.2.6 release (see ReleaseSchedule
for a link to the list of blockers).