NTPsec 1.2.2 released
Matt Selsky
Matthew.Selsky at twosigma.com
Thu Dec 29 07:06:16 UTC 2022
The NTPsec Project is pleased to announce the tagging of version 1.2.2
* Restore/cleanup NTPv1 support
* ntpq sysstats now shows NTPv1 traffic.
* NTPv1 counter added to sysstats log file.
* NTS supports partial wildcards, for example *.example.com
* Work on documentation, ntpdate, ntpheat, ntploggpg, ntpq’s sysstats, ntpviz, and seccomp.
* NTP auth no longer breaks on NULs.
* The NTS server now saves 10 days worth of cookie keys. This will allow clients that only poll once a day to use NTS without using NTS-KE to keep cookies up to date.
* rawstats now logs dropped packets and their BOGON code
* Only one per request to avoid DoSing the log file
* This lets you see packets that take too long.
* Add 4 or 6 to DNS/NTS RefID tags to indicate that the DNS or NTS-KE has succeeded but NTP has not worked yet.
* Build improvements
* Respect --notests configure option for build
* Add --enable-attic (default off)
* Restore Python 2.6 support
* Restore LibreSSL support
* Add support for OpenSSL 3.0
* Fix hash validation in ntpleapfetch again.
* FreeBSD now gets nanosecond resolution on receive time stamps.
For other changes since the previous release, please consult the project NEWS.adoc file at https://gitlab.com/NTPsec/ntpsec/-/blob/master/NEWS.adoc
Getting this release
You can clone the git repo from https://gitlab.com/NTPsec/ntpsec.git and you can download the release tarballs with sums and signatures from https://ftp.ntpsec.org/pub/releases/
This release is signed with the GPG key id E57235D22764129FA4F2F4D17F52608ED0E49D76
Matt Selsky
Release Manager of the NTPsec Project
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/announce/attachments/20221229/0ce2b175/attachment.htm>
More information about the announce
mailing list