NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Test cases for the new SNTP program
In order to verify that the new SNTP program does what it should we need to prepare some tests it should be able to complete successfully.
If you have any suggestions please post them below. Thank you!
Have SNTP run with multiple Servers with both IPv4 and IPv6 addresses.
Sync system clock, manipulate system clock to be a random time value off and then have SNTP deliver the proper correction (plus/minus a certain tolerance).
Sync with a server that requires MD5 authentication.
Sync with both IPv4 and IPv6 broadcast mode.
Send KOD response to SNTP client to see if it reacts properly.
- 29 Dec 2008