From Matthew.Selsky at twosigma.com Thu Dec 29 07:06:16 2022 From: Matthew.Selsky at twosigma.com (Matt Selsky) Date: Thu, 29 Dec 2022 07:06:16 +0000 Subject: NTPsec 1.2.2 released Message-ID: The NTPsec Project is pleased to announce the tagging of version 1.2.2 * Restore/cleanup NTPv1 support * ntpq sysstats now shows NTPv1 traffic. * NTPv1 counter added to sysstats log file. * NTS supports partial wildcards, for example *.example.com * Work on documentation, ntpdate, ntpheat, ntploggpg, ntpq?s sysstats, ntpviz, and seccomp. * NTP auth no longer breaks on NULs. * The NTS server now saves 10 days worth of cookie keys. This will allow clients that only poll once a day to use NTS without using NTS-KE to keep cookies up to date. * rawstats now logs dropped packets and their BOGON code * Only one per request to avoid DoSing the log file * This lets you see packets that take too long. * Add 4 or 6 to DNS/NTS RefID tags to indicate that the DNS or NTS-KE has succeeded but NTP has not worked yet. * Build improvements * Respect --notests configure option for build * Add --enable-attic (default off) * Restore Python 2.6 support * Restore LibreSSL support * Add support for OpenSSL 3.0 * Fix hash validation in ntpleapfetch again. * FreeBSD now gets nanosecond resolution on receive time stamps. For other changes since the previous release, please consult the project NEWS.adoc file at https://gitlab.com/NTPsec/ntpsec/-/blob/master/NEWS.adoc Getting this release You can clone the git repo from https://gitlab.com/NTPsec/ntpsec.git and you can download the release tarballs with sums and signatures from https://ftp.ntpsec.org/pub/releases/ This release is signed with the GPG key id E57235D22764129FA4F2F4D17F52608ED0E49D76 Matt Selsky Release Manager of the NTPsec Project -------------- next part -------------- An HTML attachment was scrubbed... URL: