NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38. Notes:
ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.
Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.
Email the server contact for sync access.
Admin preference for clients is to use the international (pool.ntp.org) or ca. / northamerica. CNAMEs. See NTPPoolServers
for more information.
Strict policy with regards to access. Please follow the guidelines as given on this site. If you don't have written permission, expect to get blocked
. No exceptions.
We do not run high-end servers here, we're just a small LAN, so please, if you do have written permission to sync to us, please make sure that your NTP clients are well configured as per your software's documentation; I'd rather serve people, rather than block them, or stop doing this entirely.
- Server list entry maintainer: