I can offer one interesting section from this site
http://www.openbsd.org/security.html :
OpenBSD 4.2 and earlier releases are not supported anymore. The
following paragraphs only list advisories issued while they were
maintained; these releases are likely to be affected by the advisories
for mor
It will serve time if it receives enough valid packets, possibly from
other sources. If you use the default setup, it uses multiple peers
so you should be ok.
Well, in this case, my box is the server (time.cdmon.com) and these kind
of packets are sendend by the ntp clients.
Btw, more recent
On Mon, Mar 16, 2009 at 10:14:54AM +0100, Jordi Espasa Clofent wrote:
> Hi folks,
>
> Looking at /var/log/messages in my time server (OpenBSD 4.2, amd) I see
> a lot of:
>
> Mar 14 03:25:06 ntp01 ntpd[22179]: malformed packet received from
> 80.24.191.155
>
> Looking at relationed code (ntp_ms
Hi folks,
Looking at /var/log/messages in my time server (OpenBSD 4.2, amd) I see
a lot of:
Mar 13 15:03:11 ntp01 ntpd[22179]: malformed packet received from
217.125.3.73
Mar 13 15:11:43 ntp01 ntpd[22179]: malformed packet received from
83.50.162.232
Mar 13 15:14:35 ntp01 ntpd[22179]: malfor
4 matches
Mail list logo