NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p15 was released on 23 June 2020 and addresses 1 medium-severity issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p14.

Please see the NTP Security Notice for vulnerability and mitigation details.

This is the NTP Public Services Project Bugzilla which provides tracking of development issues (e.g. bugs, enhancements) for the Network Time Protocol (NTP) Reference Implementation produced by the NTP Project.

Security related bugs, real or suspected, are to be reported by e-mail to security@ntp.org. PLEASE DO NOT ENTER SECURITY RELATED REPORTS IN THIS BUG TRACKING SYSTEM.

Please use the NTP Newsgroup comp.protocols.time.ntp or the NTP Mailing Lists for discussions of NTP-related matters which are not development issues.

First time visitors may need to load our Certificate Authority's Root Certificate in their web-browser. Please visit the CAcert Root Certificate page for installation links.

NTP Bugzilla

File a Bug Search Open a New Account

Current Releases of NTP

Stable 4.2.8p15 2020/06/23 http/md5 http
Development 4.3.99 2019/06/07 http/md5 http