NTPsec 1.2.4 released
Matt Selsky
Matthew.Selsky at twosigma.com
Sat Apr 19 03:43:27 UTC 2025
The NTPsec Project is pleased to announce the tagging of version 1.2.4
* waf has been upgraded to version 2.1.4 NB: on Debian, waf now installs
Python programs (ntpq, ntpmon, ...) in
/usr/local/lib/python3.xx/site-packages rather than .../dist-packages A quick
fix is to link site-packages to dist-packages before installing. You will
have to do that again each time your distro updates to a new version of
Python.
* Python 2.7 is now the minimum supported version. This is likely to be the
last release supporting Python 2.
* waf install now tests the installed binaries. This will complain if your
python search path isn't working. See README-PYTHON for more info.
* waf configure --enable-Werror will turn warnings into errors. This lets
developers and our CI find warnings in a sea of printout.
* Fix ntpviz's skewness and kurtosis formulas. Fix suggested by Frank Davis.
* ntpd now runs on FIPS mode systems.
* Clock fuzzing is gone. --disable-fuzz is now standard.
* Fix distinct rpeers mode in PeerSummary.summary.
* Fix addr2refid to work with FIPS-140-2 mode.
* Update the leap-seconds.list source in ntpleapfetch.
* Remove obsolete nopeer and notrap mentions from the Access Control List
documentation.
* ntpd can now listen on a second port. Add either "nts port xxxx" or "extra
port xxxx" in your config file. If either is specified, the NTS-KE server
will tell the client to use that port. This might help get around some of
the blocking or filtering that ISPs are doing to port 123. (Don't forget to
let UDP traffic for that port through your firewall.) I've been testing with
port 8123.
* Client requests will also be sent from that port. Again, that will bypass
some port 123 filtering.
* NTPsec now builds on Linux armhf. #832
* Remove some remnant broadcast/multicast cruft.
* Add a ntpdig option to bind to a specific address.
* Add an ntpd config file option for the NTS-KE server's preferred TLS ciphers.
* Use ntp_gettime not than ntp_adjtime for local refclcock. Set the lockclock
member of loop_data while the config parses, making ntp_adjtiime unusable.
Don't write a drift file while in lockclock mode and claim to slew time so
that clients will listen to us,
* Work around musl library in Alpine Linux not supporting ntp_gettime.
* Remove unused holdover, LOOP_KERN_CLEAR and timetoa from ntpd.
* Move toward AES-128 rather than MD5 for mac tests.
* Add and revise exponential timing decay and MS-SNTP testing tools.
For other changes since the previous release, please consult the project
NEWS.adoc file at https://gitlab.com/NTPsec/ntpsec/-/blob/master/NEWS.adoc
Getting this release:
You can clone the git repo from https://gitlab.com/NTPsec/ntpsec.git and you
can download the release tarballs with sums and signatures from
https://ftp.ntpsec.org/pub/releases/
This release is signed with the GPG key id
E57235D22764129FA4F2F4D17F52608ED0E49D76
--
Matt Selsky
Release Manager
NTPsec Project
More information about the devel
mailing list