NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p17 was released on 6 June 2023 and addresses 3 bugs including a regression that breaks hex-encoded keys in 4.2.8p16.

Please see the NTP Security Notice for vulnerability and mitigation details.

Welcome to Bugzilla

Current Releases of NTP

Release Version Date Download ChangeLog
Stable 4.2.8p17 2023/06/06 https/md5 https
Development 4.3.99 2019/06/07 https/md5 https

This is the NTP Public Services Project Bugzilla which provides tracking of development issues (e.g. bugs, enhancements) for the Network Time Protocol (NTP) Reference Implementation produced by the NTP Project.

Please report security related bugs by PGP-encrypted email to the NTF Security Officer Team. You can use our NTF Security Officer Key. PLEASE DO NOT ENTER SECURITY RELATED REPORTS IN THIS BUG TRACKING SYSTEM.

Please use the NTP Group or the NTP Mailing Lists for discussions of NTP-related matters which are not development issues.


Common Queries: