[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Yet another NTP security bug we fixed before the CVE issued
- Subject: Yet another NTP security bug we fixed before the CVE issued
- From: stenn at ntp.org (Harlan Stenn)
- Date: Sat, 29 Oct 2016 01:36:51 +0000
- In-reply-to: <[email protected]>
- References: <[email protected]>
"Eric S. Raymond" writes:
> ...
Yawn. We disabled interleave a while ago.
Interleave is the best way to get the next major step in accurate time
using the NTP Protocol. Yes, it needs work. A reference implementation
is where this work happens.
Yes, we have another release about to happen. Mostly "security" bugs
that folks will not see, if they're being at all responsible.
Eric, you are loved and appreciated, and respected and admired.
--
Harlan Stenn <stenn at ntp.org>
http://networktimefoundation.org - be a member!