Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 20 May 2015 08:53:17 +0200
From:      Andre Albsmeier <Andre.Albsmeier@siemens.com>
To:        Dennis Glatting <freebsd@pki2.com>
Cc:        Kent Kuriyama <kent.kuriyama@gmail.com>, Arthur Chance <freebsd@qeng-ho.org>, FreeBSD-Questions <freebsd-questions@freebsd.org>
Subject:   Re: NTP peering broken since recent security update?
Message-ID:  <20150520065317.GA69895@bali>
In-Reply-To: <1428816325.33049.17.camel@pki2.com>
References:  <5526A2F1.5030609@qeng-ho.org> <CACArijCGxeFFzuP6X=vyvz+5CR25ik74jvrdPsSUv2yFVjz3OA@mail.gmail.com> <1428816325.33049.17.camel@pki2.com>

Next in thread | Previous in thread | Raw E-Mail | Index | Archive | Help
On Sat, 11-Apr-2015 at 22:25:25 -0700, Dennis Glatting wrote:
> On Thu, 2015-04-09 at 08:14 -1000, Kent Kuriyama wrote:
> > Are you doing any NTP authentication between peers?
> > 
> 
> ntp_proto.c appears to be the problem.

Same here. I don't use auth between my peers but was hit
by the same problem.

> * If you make the diffs from the enclosed patch against the updated
> ntp_proto.c (i.e., the updated version from svn), peering works.

This patch restored functionality here as well. I hope we
will get a revised SA-15:07 soon (or an MFC of HEAD's ntp
into 9-STABLE).

	-Andre



Want to link to this message? Use this URL: <http://docs.FreeBSD.org/cgi/mid.cgi?20150520065317.GA69895>