NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38. New users should consult the DocumentationIndex before contacting the NTP development team with questions.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Source releases and patches
The NTP project only produces source code releases of NTP. These releases may be installed using the standard Unix "make" command. Please contact your operating system vendor for binary packages or assistance with your package-management system. NTP users who wish to track the development version of NTP should see the development page
, because NTP tarballs are produced infrequently. Most users should download from the table below.
Current versions of NTP
Patch files are avilable in the FTP archive
and the HTTP archive
The NTP release notes are avilable linked from the NTP information page
. Scroll to find a link.
The NTP version numbering
page explains the version numbering scheme.
Obsolete versions of NTP are avilable in the deprecated FTP
archive and the deprecated HTTP
Third-party implementations and some ports of the NTP package are linked to on the links page
- 4.2.0 is the -stable release.
- 4.2.1 is the pending -dev release; when it goes "live" it will become -stable.
- 4.3.0 is "some time in the future -dev release".