r4 - 2006-11-15 - 19:43:52 - TWikiContributorYou are here: NTP >  Main Web > WebChanges
NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.

Please see the NTP Security Notice for vulnerability and mitigation details.

Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.

50 Recent Changes in Main Web retrieved at 11:49 (GMT)

Statistics for nop Main Web Month: Topic views: Topic saves: File uploads: Most popular topic views: Top contributors for topic save and ...
Release Notifications and Information #EmaiL E mail Announcements are made through the following mailing lists: Development Releases hackers@lists ...
Stable 4.2.8p15 2020/06/23 Development 4.3.99 2019/06/07
Network Time Foundation's NTP Support Wiki Providing public support services for Time Foundation's NTP Project and hosting the IETF NTP Working Group. Copyright for ...
NTP Bug 2382 Peer precision 31 gives division by zero
NTP Bug 1774 ntpd segfaults if cryptostats enabled when built without OpenSSL
NTP Bug 1593 ntpd abort in free() with logconfig syntax error
Our Donors Our donors are listed on our Current Members and Donors page. Please see our Donate page if you are interested in supporting the Project.
The NTP Project The NTP Project produces a reference implementation of the NTP protocol, and implementation documentation, through a largely a volunteer effort. The ...
NTP Contact Information
NTP Bug 3661 Memory leak with CMAC keys
NTP Bug 3610 process control() should bail earlier on short packets
NTP Bug 3596 Unauthenticated and unmonitored ntpd may be susceptible to IPv4 attack from highly predictable transmit timestamps
NTP Bug 3592 DoS Attack on Unauthenticated Client.
NTP Bug 3565 Crafted null dereference attack from a trusted source with an authenticated mode 6 packet
NTP Bug 3505 NTPQ/NTPDC: Buffer Overflow in openhost()
NTP Bug 3454 Unauthenticated packet can reset authenticated interleaved association
NTP Bug 3453 Interleaved symmetric mode cannot recover from bad state
NTP Bug 3415 Provide a way to prevent authenticated symmetric passive peering
NTP Bug 3414 ntpq: decodearr() can write beyond its 'buf' limits (Medium)
NTP Bug 3412 ctl getitem(): buffer read overrun leads to undefined behavior and information leak (Info/Medium)
NTP Bug 3389 NTP 01 016 NTP: Denial of Service via Malformed Config (Medium)
NTP Bug 3388 NTP 01 014 NTP: Buffer Overflow in DPTS Clock (Low)
NTP Bug 3387 NTP 01 012 NTP: Authenticated DoS via Malicious Config Option (Medium)
NTP Bug 3386 NTP 01 011 NTP: ntpq stripquotes() returns incorrect value (Info)
NTP Bug 3385 NTP 01 010 NTP: ereallocarray()/eallocarray() underused (Info)
NTP Bug 3384 NTP 01 009 NTP: Privileged execution of User Library code (WINDOWS PPSAPI ONLY) (Low)
NTP Bug 3383 NTP 01 008 NTP: Stack Buffer Overflow from Command Line (WINDOWS installer ONLY) (Low)
NTP Bug 3382 NTP 01 007 NTP: Data Structure terminated insufficiently (WINDOWS installer ONLY) (Low)
NTP Bug 3381 NTP 01 006 NTP: Copious amounts of Unused Code (Info)
NTP Bug 3380 NTP 01 005 NTP: Off by one in Oncore GPS Receiver (Low)
NTP Bug 3379 NTP 01 004 NTP: Potential Overflows in ctl put() functions (Medium)
NTP Bug 3378 NTP 01 003 NTP: Improper use of snprintf() in mx4200 send() (Low)
NTP Bug 3377 NTP 01 002 NTP: Buffer Overflow in ntpq when fetching reslist from a malicious ntpd (Medium)
NTP Bug 3376 NTP 01 001 NTP: Makefile does not enforce Security Flags (Informational)
NTP Bug 3361 0rigin DoS (Medium)
NTP Bug 3119 Mode 6 unauthenticated trap information disclosure and DDoS vector
NTP Bug 3118 Mode 6 unauthenticated trap information disclosure and DDoS vector
NTP Bug 3114 Broadcast Mode Replay Prevention DoS
NTP Bug 3113 Broadcast Mode Poll Interval Enforcement DoS
NTP Bug 3110 Windows: ntpd DoS by oversized UDP packet
NTP Bug 3102 Zero Origin timestamp regression
NTP Bug 3082 read mru list() does inadequate incoming packet checks
NTP Bug 3072 Attack on interface selection
NTP Bug 3071 Client rate limiting and server responses
NTP Bug 3067 Fix for bug 2085 broke initial sync calculations
NTP Bug 3046 CRYPTO NAK crash
Number of topics: 50

See also: rss-small RSS feed, recent changes with 50, 100, 200, 500, 1000 topics, all changes

Edit | WYSIWYG | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r4 < r3 < r2 < r1 | More topic actions
SSL security by CAcert
Get the CAcert Root Certificate
This site is powered by the TWiki collaboration platform
IPv6 Ready
Copyright & 1999-2022 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback