NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Jupiter Refclocks - Development
Development issues concerning Jupiter Refclocks. See ConfiguringJupiterRefclocks
Editing the code to change
is lame. Why not do it like
, for example?
- 07 Sep 2004
The jupiter refclock is alleged to require:
Which of these does linux not provide, yet the jupiter refclock will work without it?
- 07 Sep 2004
checking for inline... inline
checking for struct timespec... yes
checking timepps.h usability... no
checking timepps.h presence... no
checking for timepps.h... no
checking sys/timepps.h usability... yes
checking sys/timepps.h presence... yes
checking for sys/timepps.h... yes
I do not quite understand what you mean. Seems that at least 2.4.21-NANO supplies all three.
- 05 Oct 2004
OK, then why does ConfiguringJupiterRefclocks
say that the jupiter refclock does not build on linux by default?
If the above condition is met, it will be.
On my Linux 2.4.20 with PPSkit patch on a Redhat 9 system the JUPITER refclock compiles in ntp-4.2.0 by default.
Attached is a patch for refclock_jupiter.c to enable hardpps using flag4 ie adding 'flag4 1' to the server line will enable hardpps
- 06 Mar 2005
Please use https://bugzilla.ntp.org
and "attach" patches there - one cannot tell if (or when) the refclock maintainer will see anything posted here.
- 13 Apr 2005