Date: Wed, 20 May 2015 08:53:17 +0200 From: Andre Albsmeier <Andre.Albsmeier@siemens.com> To: Dennis Glatting <freebsd@pki2.com> Cc: Kent Kuriyama <kent.kuriyama@gmail.com>, Arthur Chance <freebsd@qeng-ho.org>, FreeBSD-Questions <freebsd-questions@freebsd.org> Subject: Re: NTP peering broken since recent security update? Message-ID: <20150520065317.GA69895@bali> In-Reply-To: <1428816325.33049.17.camel@pki2.com> References: <5526A2F1.5030609@qeng-ho.org> <CACArijCGxeFFzuP6X=vyvz%2B5CR25ik74jvrdPsSUv2yFVjz3OA@mail.gmail.com> <1428816325.33049.17.camel@pki2.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, 11-Apr-2015 at 22:25:25 -0700, Dennis Glatting wrote: > On Thu, 2015-04-09 at 08:14 -1000, Kent Kuriyama wrote: > > Are you doing any NTP authentication between peers? > > > > ntp_proto.c appears to be the problem. Same here. I don't use auth between my peers but was hit by the same problem. > * If you make the diffs from the enclosed patch against the updated > ntp_proto.c (i.e., the updated version from svn), peering works. This patch restored functionality here as well. I hope we will get a revised SA-15:07 soon (or an MFC of HEAD's ntp into 9-STABLE). -Andre
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20150520065317.GA69895>