The NTPsec Project is pleased to announce the tagging of version 1.2.2

  • Restore/cleanup NTPv1 support

    • ntpq sysstats now shows NTPv1 traffic.

    • NTPv1 counter added to sysstats log file.

  • NTS supports partial wildcards, for example *.example.com

  • Work on documentation, ntpdate, ntpheat, ntploggpg, ntpq’s sysstats, ntpviz, and seccomp.

  • NTP auth no longer breaks on NULs.

  • The NTS server now saves 10 days worth of cookie keys. This will allow clients that only poll once a day to use NTS without using NTS-KE to keep cookies up to date.

  • rawstats now logs dropped packets and their BOGON code

    • Only one per request to avoid DoSing the log file

    • This lets you see packets that take too long.

  • Add 4 or 6 to DNS/NTS RefID tags to indicate that the DNS or NTS-KE has succeeded but NTP has not worked yet.

  • Build improvements

    • Respect --notests configure option for build

    • Add --enable-attic (default off)

    • Restore Python 2.6 support

    • Restore LibreSSL support

    • Add support for OpenSSL 3.0

  • Fix hash validation in ntpleapfetch again.

  • FreeBSD now gets nanosecond resolution on receive time stamps.

For other changes since the previous release, please consult the project NEWS.adoc file at https://gitlab.com/NTPsec/ntpsec/-/blob/master/NEWS.adoc

Getting this release

You can clone the git repo from https://gitlab.com/NTPsec/ntpsec.git and you can download the release tarballs with sums and signatures from https://ftp.ntpsec.org/pub/releases/

This release is signed with the GPG key id E57235D22764129FA4F2F4D17F52608ED0E49D76