NTPsec 1.2.2 released

Matt Selsky Matthew.Selsky at twosigma.com
Thu Dec 29 07:06:16 UTC 2022


The NTPsec Project is pleased to announce the tagging of version 1.2.2

  *   Restore/cleanup NTPv1 support
     *   ntpq sysstats now shows NTPv1 traffic.
     *   NTPv1 counter added to sysstats log file.
  *   NTS supports partial wildcards, for example *.example.com
  *   Work on documentation, ntpdate, ntpheat, ntploggpg, ntpq’s sysstats, ntpviz, and seccomp.
  *   NTP auth no longer breaks on NULs.
  *   The NTS server now saves 10 days worth of cookie keys. This will allow clients that only poll once a day to use NTS without using NTS-KE to keep cookies up to date.
  *   rawstats now logs dropped packets and their BOGON code
     *   Only one per request to avoid DoSing the log file
     *   This lets you see packets that take too long.
  *   Add 4 or 6 to DNS/NTS RefID tags to indicate that the DNS or NTS-KE has succeeded but NTP has not worked yet.
  *   Build improvements
     *   Respect --notests configure option for build
     *   Add --enable-attic (default off)
     *   Restore Python 2.6 support
     *   Restore LibreSSL support
     *   Add support for OpenSSL 3.0
  *   Fix hash validation in ntpleapfetch again.
  *   FreeBSD now gets nanosecond resolution on receive time stamps.

For other changes since the previous release, please consult the project NEWS.adoc file at https://gitlab.com/NTPsec/ntpsec/-/blob/master/NEWS.adoc

Getting this release
You can clone the git repo from https://gitlab.com/NTPsec/ntpsec.git and you can download the release tarballs with sums and signatures from https://ftp.ntpsec.org/pub/releases/

This release is signed with the GPG key id E57235D22764129FA4F2F4D17F52608ED0E49D76

Matt Selsky
Release Manager of the NTPsec Project
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/announce/attachments/20221229/0ce2b175/attachment.htm>


More information about the announce mailing list