* Python 2.7 is now the minimum supported version.
* waf has been upgraded to version 2.1.4
* waf install now tests the installed binaries
* waf configure --enable-Werror will turn warnings into errors
* Fix ntpviz's skewness and kurtosis formulas.
* ntpd now runs on FIPS mode systems.
* Clock fuzzing is gone. --disable-fuzz is now standard.
* Fix distinct rpeers mode in PeerSummary.summary.
* Fix addr2refid to work with FIPS-140-2 mode.
* Update the leap-seconds.list source in ntpleapfetch.
* Remove obsolete nopeer and notrap mentions from the Access
Control List documentation.
* ntpd can now listen on a second port.Add either "nts port
xxxx" or "extra port xxxx" in your config file. If either is
specified, the NTS-KE server will tell the client to use that
port. This might help get around some of the blocking or
filtering that ISPs are doing to port 123.
* Client requests will also be sent from that port.Again, that
will bypass some port 123 filtering.
* NTPsec now builds on Linux armhf.
* Remove some remnant broadcast/multicast cruft.
* Add a ntpdig option to bind to a specific address.
* Add an ntpd config file option for the NTS-KE server's
preferred TLS ciphers.
* Use ntp_gettime not than ntp_adjtime for local refclcock. Set
the lockclock member of loop_data while the config parses,
making ntp_adjtiime unusable. Don't write a drift file while
in lockclock mode and claim to slew time so that clients will
listen to us,
OBS-URL: https://build.opensuse.org/package/show/network:time/ntpsec?expand=0&rev=101
66 KiB
66 KiB