NTP users are strongly urged to take immediate action to ensure that their NTP daemons are not susceptible to being used in distributed denial-of-service (DDoS) attacks. Please also take this opportunity to defeat denial-of-service attacks by implementing Ingress and Egress filtering through BCP38.

ntp-4.2.8p15 was released on 23 June 2020 and addresses 1 medium-severity issue in ntpd, and provides 13 non-security bugfixes over 4.2.8p14.

Please see the NTP Security Notice for vulnerability and mitigation details.

Welcome to Bugzilla

Current Releases of NTP

Release Version Date Download ChangeLog
Stable 4.2.8p15 2020/06/23 https/md5 https
Development 4.3.99 2019/06/07 https/md5 https

This is the NTP Public Services Project Bugzilla which provides tracking of development issues (e.g. bugs, enhancements) for the Network Time Protocol (NTP) Reference Implementation produced by the NTP Project.

Security related bugs, real or suspected, are to be reported by e-mail to security@ntp.org. PLEASE DO NOT ENTER SECURITY RELATED REPORTS IN THIS BUG TRACKING SYSTEM.

Please use the NTP Group or the NTP Mailing Lists for discussions of NTP-related matters which are not development issues.


Common Queries: