From owner-freebsd-questions Fri Apr 6 16:12:34 2001 Delivered-To: freebsd-questions@freebsd.org Received: from sargon.photon.com (ritz.photon.com [216.141.160.144]) by hub.freebsd.org (Postfix) with ESMTP id 13EED37B422 for ; Fri, 6 Apr 2001 16:12:32 -0700 (PDT) (envelope-from matt@photon.com) Received: from sargon.photon.com (frep@sargon.photon.com [172.16.10.24]) by sargon.photon.com (8.11.2/8.11.2) with ESMTP id f36NCao37223; Fri, 6 Apr 2001 16:12:37 -0700 (PDT) Date: Fri, 6 Apr 2001 16:12:36 -0700 (PDT) From: Matt Wilbur To: Steven Petmecky Cc: freebsd-questions@freebsd.org Subject: Re: NTPD 4.0.99k Patch? In-Reply-To: <007701c0beed$96096aa0$1eabcecf@accessus.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG echo "restrict default ignore" >> /etc/ntp.conf restart ntpd .... -Matt On Fri, 6 Apr 2001, Steven Petmecky wrote: > Does anyone have a fully patched tarball of the ntpd 4.0.99k FreeBSD port, that fixes the remote buffer overflow exploit? I've got timeservers I really need to put back into service. > > > > To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message