r1 - 2003-07-28 - 03:21:00 - SteveKosteckeYou are here: NTP >  Support Web > BugzillaEmailNotes
NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p15 was released on 23 June 2020. It addresses 1 medium-severity security issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p13.

Please see the NTP Security Notice for vulnerability and mitigation details.

Are you using Autokey in production? If so, please contact Harlan - he's got some questions for you.

Replying to Bugzilla-mail about existing bugs

You may reply to any bugzilla-mail for an existing bug and the text of your reply will be appended to the bug comments. Your reply must have a Subject: [Bug XXX] and should be From: .

Attachments to your reply (e.g. patches, documents) will be attached to the bug report.

Creating new bugs via e-mail

One way to get started is to send an empty e-mail to bugzilla@ntp.org with Subject: [New Bug] and follow the instructions in the reply that you receive from bugzilla.

You may also fill in the following bug report template (add your information after the colon on each line) and mail it to bugzilla@ntp.org with Subject: [New Bug]. You will receive an error message from bugzilla if the submitted information is incomplete or incorrect. The error message will include information that will help you correct your bug report for resubmission. You will receive a success message when your bug report is accepted.

    @product        :  
    @version        :  
    @component      :  
    @short_desc     :  

    @rep_platform   :
    @bug_severity   :
    @priority       :
    @op_sys         :
    @assigned_to    :
    @groupset       :
   < the bug-description follows here >

Bug Report Data

The following information may be used to complete the bug report template shown above and was valid when this guide was written.

  • Product (required):
    • FAQ - the ntp FAQ document
    • ntp - ntp software / documentation
    • ntp.org_site - issues about the ntp.org site

  • Version:
    • Default: unspecified
    • Or select a pre-defined version for the product your bug report applies to

  • Component (required):
    • Select the pre-defined product component that your bug report applies to

  • Short Description:
    • Default: the subject of your e-mail
    • This will be the bug title

  • Platform:
    • Default: All
    • Or select one of the following pre-defined platforms:
      • All
      • N/A
      • DEC
      • HP
      • IBM
      • Macintosh
      • PC
      • SGI
      • Sun
      • Other

  • Severity:
    • Default: normal
    • Or select one of the following pre-defined serverities:
      • blocker
      • critical
      • major
      • normal
      • minor
      • trivial
      • enhancement

  • Priority:
    • Default: P3
    • Or select one of the following predefined priorities:
      • P1
      • P2
      • P3
      • P4
      • P5

  • Operating System:
    • Default: Linux
    • Or select one of the following predefined operating systems:

  • Assigned To:
    • Default: QA contact
    • Or enter a valid bugzilla e-mail address

  • Groupset:
    • Default: Internal Bug
    • Or enter one, or more, predefined group names. Seperate multiple names with spaces
      • ntp.org_site - for bugs that should be seen only by the ntp.org staff
      • Security - for security related bugs that should only be seen by the ntp security team
      • Members - for bugs that should only be seen by ntp project members

-- SteveKostecke - 28 Jul 2003

Edit | WYSIWYG | Attach | Printable | Raw View | Backlinks: Web, All Webs | History: r2 < r1 | More topic actions...
NTP.BugzillaEmailNotes moved from Wizards.BugzillaEmailNotes on 2003-07-28 - 03:25 by SteveKostecke
SSL security by CAcert
Get the CAcert Root Certificate
This site is powered by the TWiki collaboration platform
IPv6 Ready
Copyright & 1999-2022 by the contributing authors. All material on this collaboration platform is the property of the contributing authors. Ideas, requests, problems regarding the site? Send feedback