NTP 4.2.8p5 Release Announcement

January 2016 NTP 4.2.8p5 Security Vulnerability Announcement NTP 4.2.8p5, released on 7 January 2016, contains two security-related issues and several minor bug fixes and code improvements since NTP 4.2.8p4, which was released on 21 October 2015. Bug 2956: CVE-2015-5300 Small-step/Big-step This issue was published in October by Boston University. When it was first discovered, we… Read More.

Taking stock of time

“You may delay, but time will not.”- Benjamin Franklin We offer our sincere thanks to all of the organizations and people who contributed and supported Network Time Foundation’s efforts to implement, develop and advance the Precision Time Protocol (PTP) and Network Time Protocol (NTP) Standards and projects over this past year. Your help has been… Read More.

NTF releases NTP Security patches in ntp-4.2.8p4

Network Time Foundation (NTF) releases ntp-4.2.8p4 containing several security patches. NTF’s NTP Project has released ntp-4.2.8p4, which fixes thirteen (13) low- and medium-severity security bugs and also includes about 100 bug fixes and code improvements since 4.2.8p3, which was released on the 29th of June, 2015. Here is a summary, and see NTF’s NTP Project’s… Read More.

EVENT: NTF to attend ISPCS Symposium in Beijing

Richard Garling and Wojciech Owczarek will be attending the 2015 ISPCS – International IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication. Come talk with us about Network Time Protocol, PTP, General Timestamp and other time projects at the Plugfest or technical conference starting October 11th – October 16th. We hope to see… Read More.

Network Time Protocol & GSoC 2015 wrap-up

Google Summer of Code 2015 – NTF’s NTP projects are heading to the finish line We are excited to be approaching the last phase of Network Time Foundation’s sponsorship in GSoC 2015! There was great participation from the Mentors and Students both, and their work has already been put to use in improving Network Time… Read More.

Network Time Security – NTS replacing Autokey

Network Time Foundation is Improving its NTP Project Security with NTS – Network Time Security Project First, some history about Network Time Protocol (NTP) and authentication. NTP saw its original cryptographic authentication code back around 1992, in the ntp3 distribution, when it used MD5 hashes to authenticate remote configuration requests. This was a “private key”… Read More.

NTF’s NTP Project gets support from Linux Foundation

NTF’s Program Manager, Rich Garling, extends his appreciation to the Linux Foundation/CII for its renewed support for a portion of Harlan Stenn’s vitally important development efforts on Network Time Foundation’s NTP Project. Please read Charles Babcock’s Information Week article  Linux Foundation funds NTP’s Father Time  for additional information on this essential project. NTF also wants… Read More.

NTP Algorithms talks at BIPM

Judah Levine and Poul-Henning Kamp have each been invited to give different talks about NTP algorithms in September, near Paris. These talks will be given at the VI International Time Scale Algorithms Symposium and Tutorials at Bureau International des Poids et Mesures (BIPM) conference in Sevres, France. Judah Levine (NIST, USA) is talking about An… Read More.

Leap second is no Y2K bug

June 30, 2015 by Solomon Israel, CBC News Most days last for 86,400 seconds, but June 30, 2015, will last for 86,401. Because the Earth doesn’t rotate at a constant speed, scientists have taken to adding the occasional leap second to keep international timekeeping in line with the world’s super-accurate atomic clocks. Why we’re turning our clocks ever-so-slightly back The last… Read More.

PTPd 2.3.1 released

After over 18 months of development at various intensity and final weeks of really intensive development and testing, the time has come for PTPd 2.3.1 to see the light of day. Although disappointingly late (leap second announcement has just started), it is definitely worth the upgrade. The changelog is quite a long list, perhaps too… Read More.