Improved implementation of Network Time Protocol
https://www.ntpsec.org/
A more secure NTP. Derived from NTP Classic, Dave Mills’s original.
- Developed at network:time
-
5
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Factory/ntpsec && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
logrotate.ntp | 0000000213 213 Bytes | |
ntp.conf | 0000002970 2.9 KB | |
ntp.firewall | 0000000343 343 Bytes | |
ntpsec-1.1.0.tar.gz | 0002448580 2.34 MB | |
ntpsec-1.1.0.tar.gz.asc | 0000000819 819 Bytes | |
ntpsec.changes | 0000055134 53.8 KB | |
ntpsec.spec | 0000006028 5.89 KB |
Revision 8 (latest revision is 23)
Dominique Leuenberger (dimstar_suse)
accepted
request 592276
from
Tomáš Chvátal (scarabeus_iv)
(revision 8)
- Version update to 1.1.0: * Digests longer then 20 bytes will be truncated. * We have merged NTP Classic's fix for CVE-2018-7182. * we have dropped support for Broadcast servers. We had kept it for older desktop operating systems listening on the local network broadcast domain, a use case that is now no longer in use at sane enviroments, and no longer necessary for modern desktop OSs. * It is now possible to unpeer refclocks using a type/unit specification rather than a magic IP address. This was the last obligatory use of magic IP addresses in the configuration grammar. * OpenBSD has been removed from the list of supported platforms for ntpd. It will be restored if and when its clock API supports drift adjustment via ntp_adjtime() or equivalent facility. * Mac OS X support has been dropped pending the implementation of ntp_adjtime(2). * A bug that caused the rejection of 33% of packets from Amazon time service has been fixed.
Comments 0