NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
The general access policy of a TimeServer
. The following choices are available:
The following usage guidelines apply to all time servers unless modified by the time server operator:
iburst may be used
burst may not be used
minpoll/maxpoll may not be changed below the defaults of 64 seconds and 1024 seconds respectively
- Clients should honor the
- Time Server IP addresses may not be hard-coded in any hardware, firmware, or software without advance explicit written permission from the time server operator
- Time Server DNS addresses should not be hard-coded in any hardware, firmware, or softrware without advance explicit written permission from the time server operator
Please check each time server's AccessDetails
for additional information, conditions, and restrictions prior to use.