r92 - 2014-01-07 - 17:54:32 - ChibaneAhmedYou are here: NTP >  Support Web > WebHome
NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to use in a distributed denial-of-service (DDoS) attack. Please also take this opportunity to defeat denial-of-service attacks by implementing ingress and Egress filtering through BCP38.

A new set of mode 6 vulnerabilities has been discovered and, while these vulnerabilities can be reduced by making sure you have restrict default noquery in your ntp.conf file, the best and most complete way to avoid these vulnerabilities is to install and deploy ntp-4.2.8 which was released on 18 December 2014.

Please see the NTP Security Notice for vulnerability and mitigation details.

Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
REFACTOR See WebHomeDev for discussion of this topic.

Help Wanted
* Mailing List Moderators wanted


Current Versions
Stable
  4.2.8
  2014/12/19
Release Candidate
  4.2.8p1-RC1
  2015/01/24
Release Candidate
  4.2.7p486-RC
  2014/12/18

1. NTP Support Web

This is a web-based collaboration area for Community Supported Documentation for the reference implementation of NTP from www.ntp.org. Please see the Dev Web for NTP Development.

The main starting points in this Web are:

hand A list of the main sections of this Web is available in the menu on the left side of every page

1.1. Terms and Conditions

ALERT! Use of the NTP Public Services Project web-site indicates your agreement with, and acceptance of, the PrivacyPolicy, the TWikiDisclaimer, and, if applicable, the PrivateWebPolicy.

1.2. Information for new users

TIP First time visitors should visit the User Web to learn more about the NTP TWiki and for member registration.

  • New NTP users should read the Where-To-Start file included with the NTP distribution.
  • Documentation for the current NTP distribution, along with additional information, is available on the documentation page.
  • Community supported documentation is available in the Support Web of this site.
  • NTP users who don't like to read documentation may want to refer to a QuickStart Guide.
  • If you would like to find a server to get time from, please see the public NTP server list.
  • If you would like to download NTP software please see the download page.
  • If you would like to locate NTP software other than the reference distribution, please see the links page.

1.3. Other starting points for NTP Solutions

1.4. Useful Links

Notes:

  • You are currently in the Support web. The color code for this web is this background, so you know where you are.
  • If you are not familiar with the NTP collaboration platform, please visit WelcomeGuest first.


Powered by TWiki

New TWiki users should ReadMeFirst
The TWiki TM home is http://TWiki.org/

Edit | WYSIWYG | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r92 < r91 < r90 < r89 < r88 | More topic actions
 
SSL security by CAcert
Get the CAcert Root Certificate
This site is powered by the TWiki collaboration platform
IPv6 Ready
Copyright & 1999-2015 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback