NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Open Access Time Server
An open access time server may be polled by any client complying with the usage guidelines listed below.
Clients should respect any declared ServiceArea
, but are not required to do so.
Operators of open access time servers may request, but may not require, a NotificationMessage
prior to use.
The following usage guidelines apply to Open Access Time Servers unless modified by the Time Server Operator:
Related Topics: RestrictedAccess
iburst may be used
burst may not be used
minpoll/maxpoll may not be changed below the defaults of 64 seconds and 1024 seconds respectively
- Clients should honor the
- Time Server IP addresses and/or hostnames may not be hard-coded in any hardware, firmware, or software without advance explicit written permission from the time server operator