Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 6 Apr 2001 16:12:36 -0700 (PDT)
From:      Matt Wilbur <matt@photon.com>
To:        Steven Petmecky <petmecky@support.accessus.net>
Cc:        freebsd-questions@freebsd.org
Subject:   Re: NTPD 4.0.99k Patch?
Message-ID:  <Pine.BSF.4.21.0104061612050.37179-100000@sargon.photon.com>
In-Reply-To: <007701c0beed$96096aa0$1eabcecf@accessus.net>

next in thread | previous in thread | raw e-mail | index | archive | help
echo "restrict default ignore" >> /etc/ntp.conf
restart ntpd 

....

-Matt

On Fri, 6 Apr 2001, Steven Petmecky wrote:

> Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've got timeservers I really need to put back into service.
> 
> 
> 
> 



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0104061612050.37179-100000>