NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
If all you want to do is grab a remote repository and start using it as part of a project, the simplest thing to do is clone it, then check out all of its files. (It can get much more sophisticated than this, of course, but it's a simple way to get started.)
So, if you want, say, the Linux kernel source tree at http://linux.bkbits.net:8080/linux-2.5
, you can certainly do the following:
$ bk clone http://linux.bkbits.net:8080/linux-2.5 mykernel
$ cd mykernel
$ bk -r co -q
The above checks out the tree into a directory whose name you can choose (in this case,
), then runs through the SCCS directories, checking out all of the files so you can examine and use them.
(If you don't specify a destination directory name when you do the clone, by default, you'd get the directory name of the repo itself, so it's your choice if you want a different name.)
Depending on how complicated you're getting, you can also make clones of clones, but we'll leave that until later.