Files
ntpsec/ntpsec.changes
Martin Pluskal 1170a4e4de - Update to version 1.2.4
* Python 2.7 is now the minimum supported version.
  * waf has been upgraded to version 2.1.4
  * waf install now tests the installed binaries
  * waf configure --enable-Werror will turn warnings into errors
  * Fix ntpviz's skewness and kurtosis formulas.
  * ntpd now runs on FIPS mode systems.
  * Clock fuzzing is gone.  --disable-fuzz is now standard.
  * Fix distinct rpeers mode in PeerSummary.summary.
  * Fix addr2refid to work with FIPS-140-2 mode.
  * Update the leap-seconds.list source in ntpleapfetch.
  * Remove obsolete nopeer and notrap mentions from the Access
    Control List documentation.
  * ntpd can now listen on a second port.Add either "nts port
    xxxx" or "extra port xxxx" in your config file. If either is
    specified, the NTS-KE server will tell the client to use that
    port. This might help get around some of the blocking or
    filtering that ISPs are doing to port 123.
  * Client requests will also be sent from that port.Again, that
    will bypass some port 123 filtering.
  * NTPsec now builds on Linux armhf.
  * Remove some remnant broadcast/multicast cruft.
  * Add a ntpdig option to bind to a specific address.
  * Add an ntpd config file option for the NTS-KE server's
    preferred TLS ciphers.
  * Use ntp_gettime not than ntp_adjtime for local refclcock. Set
    the lockclock member of loop_data while the config parses,
    making ntp_adjtiime unusable. Don't write a drift file while
    in lockclock mode and claim to slew time so that clients will
    listen to us,

OBS-URL: https://build.opensuse.org/package/show/network:time/ntpsec?expand=0&rev=101
2025-11-26 14:26:12 +00:00

66 KiB