Index index by Group index by Distribution index by Vendor index by creation date index by Name Mirrors Help Search

ntp-doc-4.2.8p15-lp152.3.9.1 RPM for aarch64

From OpenSuSE Ports Leap 15.2 updates for aarch64

Name: ntp-doc Distribution: openSUSE Leap 15.2
Version: 4.2.8p15 Vendor: openSUSE
Release: lp152.3.9.1 Build date: Tue Jun 22 11:23:30 2021
Group: Documentation/Other Build host: obs-arm-8
Size: 3567325 Source RPM: ntp-4.2.8p15-lp152.3.9.1.src.rpm
Packager: http://bugs.opensuse.org
Url: http://www.ntp.org/
Summary: Additional Package Documentation for ntp
The complete set of documentation for building and configuring an NTP
server or client. The documentation is in the form of HTML files
suitable for browsing and contains links to additional documentation at
various web sites.

What about NTP? Understanding and using the Network Time Protocol (A
first try on a non-technical Mini-HOWTO and FAQ on NTP). Edited by
Ulrich Windl and David Dalton.

Provides

Requires

License

(MIT and BSD-3-Clause and BSD-4-Clause) and GPL-2.0

Changelog

* Thu May 20 2021 Reinhard Max <max@suse.com>
  - jsc#SLE-15482, ntp-clarify-interface.patch:
    Adjust the documentation to clarify that "interface ignore all"
    does not cover the wildcard and localhost addresses.
* Thu Apr 22 2021 Reinhard Max <max@suse.com>
  - bsc#1185171:
    Use /run instead of /var/run for PIDFile in ntpd.service.
* Thu Jun 25 2020 Reinhard Max <max@suse.com>
  - Update to 4.2.8p15
  - Fixed security issues:
    * bsc#1169740, CVE-2020-11868:
      DoS on client ntpd using server mode packet
    * bsc#1171355, CVE-2018-8956: remote attackers may prevent a
      broadcast client from synchronizing its clock with a broadcast
      NTP server via spoofed mode 3 and mode 5 packets.
    * bsc#1172651, CVE-2020-13817: vulnerable to off-path attack
    * bsc#1173334, CVE-2020-15025: Remote DoS when CMAC key is used
  - Bugfixes in 4.2.8p15 and 4.2.8p14 include:
    * [Bug 3667] decodenetnum fails with numeric port
    * [Bug 3666] avoid unlimited receive buffer allocation
    * [Bug 3660] Manycast orphan mode startup discovery problem.
    * [Bug 3655] ntpdc memstats hash counts
    * [Bug 3653] Refclock jitter RMS calculation
    * [Bug 3646] Avoid sync with unsync orphan
    * [Bug 3644] Unsynchronized server [...] selected as candidate
    * [Bug 3636] NMEA: combine time/date from multiple sentences
    * [Bug 3635] Make leapsecond file hash check optional
    * [Bug 3628] raw DCF decoding - improve robustness
    * [Bug 3620] memory leak in ntpq sysinfo
    * [Bug 3619] Honour drefid setting in cooked mode and sysinfo
    * [Bug 3617] Add support for ACE III and Copernicus II receivers
    * [Bug 3615] accelerate refclock startup
    * [Bug 3613] Propagate noselect to mobilized pool servers
    * [Bug 3612] Use-of-uninitialized-value in receive function
    * [Bug 3611] NMEA time interpreted incorrectly
    * [Bug 3609] Fixing wrong falseticker in case of non-statistic jitter
    * [Bug 3604] Wrong param byte order passing into
      record_raw_stats() in ntp_io.c
    * [Bug 3594] ntpd discards messages coming through nmead
    * [Bug 3593] ntpd discards silently nmea messages after the 5th string
    * [Bug 3590] Update refclock_oncore.c to the new GPS date API
    * [Bug 3583] synchronization error - set clock to base date
      if system time is before that limit
    * [Bug 3582] gpsdjson refclock fudgetime1 adjustment is doubled
    * [Bug 3580] Possible bug ntpq-subs (NULL dereference in dogetassoc)
    * [Bug 3577] Update refclock_zyfer.c to the new GPS date API
    * [Bug 3576] New GPS date function API
    * [Bug 3573] nptdate: missleading error message
    * [Bug 3569] cleanup MOD_NANO/STA_NANO handling for 'ntpadjtimex()'
    * [Bug 3550] Reproducible build: Respect SOURCE_DATE_EPOCH
    * [Bug 3542] ntpdc monlist parameters cannot be set
    * [Bug 3533] ntpdc peer_info ipv6 issues
    * [Bug 3531] make check: test-decodenetnum fails
    * [Bug 3515] Refactor ntpdmain() dispatcher loop and group
      common code
    * [Bug 3491] Signed values of LFP datatypes should always
      display a sign
    * [Bug 3490] Patch to support Trimble Resolution Receivers
    * [Bug 3473] RefID of refclocks should always be text format
    * [Bug 3094] ntpd trying to listen for broadcasts on a
      completely ipv6 network
    * [Bug 2420] ntpd doesn't run and exits with retval 0 when
      invalid user is specified with -u
    * [Bug 1433] runtime check whether the kernel really supports
      capabilities
    * Provide more detail on unrecognized config file parser tokens.
    * Startup log improvements.
  - Obsoleted patches:
    * ntp-4.2.6p2-ntpq-speedup-782060.patch
    * ntp-daemonize.patch
    * ntp-reproducible.patch
  - Silence an OpenSSL version warning (bsc#992038,bsc#1125401
    ntp-openssl-version.patch).
* Mon Mar 11 2019 Reinhard Max <max@suse.com>
  - Update to 4.2.8p13
    * CVE-2019-8936, bsc#1128525: Crafted null dereference attack in
      authenticated mode 6 packet.
    * Fix several bugs in the BANCOMM reclock driver.
    * Fix ntp_loopfilter.c snprintf compilation warnings.
    * Fix spurious initgroups() error message.
    * Fix STA_NANO struct timex units.
    * Fix GPS week rollover in libparse.
    * Fix incorrect poll interval in packet.
    * Add a missing check for ENABLE_CMAC.
* Tue Sep 11 2018 max@suse.com
  - Update to 4.2.8p12 (bsc#1111853):
    * CVE-2018-12327, bsc#1098531: fixed stack buffer overflow in
      the openhost() command-line call of NTPQ/NTPDC.
    * Add further tweaks to improve the fix for CVE-2018-7170,
      bsc#1083424.
    * ntp-usrgrp-resolver.patch was integrated upstream.
  - Don't run autoreconf anymore and remove all related hacks and
    BuildRequires.
* Tue Apr 24 2018 max@suse.com
  - Refactor the key handling in %post so that it does not overwrite
    user settings (bsc#1036505) and is more robust against ignored
    SIGPIPE (bsc#1090564).
* Sun Mar 18 2018 suse-beta@cboltz.de
  - change example statsdir in ntp.conf to /var/log/ntpstats/ to match
    the AppArmor profile (boo#1076247)
* Wed Feb 28 2018 max@suse.com
  - Update to 4.2.8p11 (bsc#1082210):
    * CVE-2016-1549: Sybil vulnerability: ephemeral association
      attack. While fixed in ntp-4.2.8p7, there are significant
      additional protections for this issue in 4.2.8p11.
    * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun
      leads to undefined behavior and information leak.
    * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral
      associations.
    * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot
      recover from bad state.
    * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset
      authenticated interleaved association.
    * CVE-2018-7183, bsc#1083417: ntpq:decodearr() can write beyond
      its buffer limit.
    * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch
  - Remove dead code from conf.start-ntpd (bsc#1082063).
  - Don't use libevent's cached time stamps in sntp.
    (bsc#1077445, ntp-sntp-libevent.patch)
* Thu Dec 21 2017 bwiedemann@suse.com
  - Add ntp-reproducible.patch to make build reproducible (boo#1047218)
* Tue Dec 19 2017 max@suse.com
  - Restart nptd if failed or aborted (FATE#315133).
  - Do not try to set the HW clock when adding a server at runtime
    to avoid blocking systemd.
* Thu Nov 23 2017 rbrown@suse.com
  - Replace references to /var/adm/fillup-templates with new
    %_fillupdir macro (boo#1069468)
* Thu Apr 06 2017 max@suse.com
  - Enable experimental leap smearing (fate#321003).
    See /usr/share/doc/packages/ntp/README.leapsmear for details.
* Thu Apr 06 2017 aj@ajaissle.de
  - Fix spelling and default values in conf.sysconfig.ntp
* Wed Mar 22 2017 max@suse.com
  - Update to 4.2.8p10 (bsc#1030050):
    * Sec 3389 / CVE-2017-6464 / VU#325339: NTP-01-016 NTP:
      Denial of Service via Malformed Config
    * Sec 3388 / CVE-2017-6462 / VU#325339: NTP-01-014 NTP:
      Buffer Overflow in DPTS Clock
    * Sec 3387 / CVE-2017-6463 / VU#325339: NTP-01-012 NTP:
      Authenticated DoS via Malicious Config Option
    * Sec 3386: NTP-01-011 NTP:
      ntpq_stripquotes() returns incorrect Value
    * Sec 3385: NTP-01-010 NTP:
      ereallocarray()/eallocarray() underused
    * Sec 3381: NTP-01-006 NTP: Copious amounts of Unused Code
    * Sec 3380: NTP-01-005 NTP: Off-by-one in Oncore GPS Receiver
    * Sec 3379 / CVE-2017-6458 / VU#325339: NTP-01-004 NTP:
      Potential Overflows in ctl_put() functions
    * Sec 3378 / CVE-2017-6451 / VU#325339: NTP-01-003
      Improper use of snprintf() in mx4200_send()
    * Sec 3377 / CVE-2017-6460 / VU#325339: NTP-01-002
      Buffer Overflow in ntpq when fetching reslist
    * Sec 3376: NTP-01-001 Makefile does not enforce Security Flags
    * Sec 3361 / CVE-2016-9042 / VU#325339: 0rigin (zero origin) DoS.
    * [Bug 3393] clang scan-build findings
    * [Bug 3363] Support for openssl-1.1.0 without compatibility modes
    * [Bug 3356] Bugfix 3072 breaks multicastclient
    * [Bug 3173] forking async worker: interrupted pipe I/O
    * [Bug 3139] (...) time_pps_create: Exec format error
    * [Bug 3107] Incorrect Logic for Peer Event Limiting
    * [Bug 3062] Change the process name of forked DNS worker
    * [Bug 2923] Trap Configuration Fail
    * [Bug 2896] Nothing happens if minsane < maxclock < minclock
    * [Bug 2851] allow -4/-6 on restrict line with mask
    * [Bug 2645] out-of-bound pointers in ctl_putsys and decode_bitflags
  - Removed patches:
    * ntp-openssl-version.patch: fixed upstream
    * ntp-processname.patch: accepted upstream
    * ntp-trap.patch: accepted upstream
    * ntp-unbreak-multicast.patch: fixed upstream
  - Remove spurious log messages (bsc#1014172, ntp-warnings.patch).
* Fri Mar 10 2017 max@suse.com
  - Fix a problem with multicast clients.
    (bsc#1018940, ntp-unbreak-multicast.patch)
* Tue Feb 21 2017 kukuk@suse.de
  - Move ntp-kod to /var/lib/ntp, because /var/db is not a
    standard directory and causes problems for transactional updates
    (ntp-move-kod-file.patch)
* Tue Jan 17 2017 max@suse.com
  - Remove 50-ntp.list (bsc#1011919).
  - Use system-wide libevent instead of local copy.
* Mon Nov 28 2016 max@suse.com
  - Simplify ntpd's search for its own executable to prevent AppArmor
    warnings (bsc#956365, ntp-pathfind.patch).
* Mon Nov 21 2016 max@suse.com
  - Update to 4.2.8p9:
    * CVE-2016-9311: Trap crash.
    * CVE-2016-9310: Mode 6 unauthenticated trap information
      disclosure and DDoS vector.
    * CVE-2016-7427: Broadcast Mode Replay Prevention DoS.
    * CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS.
    * CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp
      Bypass.
    * CVE-2016-7434: Null pointer dereference in
      _IO_str_init_static_internal().
    * CVE-2016-7429: Interface selection attack.
    * CVE-2016-7426: Client rate limiting and server responses.
    * CVE-2016-7433: Reboot sync calculation problem.
    * Fix a spurious error message (obsoletes ntp-sigchld.patch).
    * Other bugfixes, see /usr/share/doc/packages/ntp/ChangeLog.
  - Fix a regression in "trap" (bsc#981252, ntp-trap.patch).
  - Reduce the number of netlink groups to listen on for changes to
    the local network setup (bsc#992606, ntp-netlink.patch).
  - Fix segfault in "sntp -a" (bnc#1009434, ntp-sntp-a.patch).
  - Silence an OpenSSL version warning (bsc#992038,
    ntp-openssl-version.patch).
* Wed Oct 05 2016 guillaume@opensuse.org
  - Depend on pps-tools-devel only for openSUSE > 13.2
* Thu Aug 25 2016 josef.moellers@suse.com
  - Make the resolver task change user and group IDs to the same
    values as the main task. (bnc#988028, ntp-usrgrp-resolver.patch)
* Tue Jun 07 2016 max@suse.com
  - Keep the parent process alive until the daemon has finished
    initialisation, to make sure that the PID file exists when the
    parent returns (ntp-daemonize.patch).
  - Update to 4.2.8p8 (bsc#982056):
    * CVE-2016-4953, bsc#982065: Bad authentication demobilizes
      ephemeral associations.
    * CVE-2016-4954, bsc#982066: Processing spoofed server packets.
    * CVE-2016-4955, bsc#982067: Autokey association reset.
    * CVE-2016-4956, bsc#982068: Broadcast interleave.
    * CVE-2016-4957, bsc#982064: CRYPTO_NAK crash.
  - Change the process name of the forking DNS worker process to
    avoid the impression that ntpd is started twice.
    (bsc#979302, ntp-processname.patch).
  - Don't ignore SIGCHILD because it breaks wait()
    (boo#981422, ntp-sigchld.patch).
  - ntp-wait does not accept fractional seconds, so use 1 instead of
    0.2 in ntp-wait.service (boo#979981).
  - Separate the creation of ntp.keys and key #1 in it to avoid
    problems when upgrading installations that have the file, but
    no key #1, which is needed e.g. by "rcntp addserver".
  - Fix the TZ offset output of sntp during DST.
    (bsc#951559, ntp-sntp-dst.patch)
  - Add /var/db/ntp-kod (bsc#916617).
  - Add ntp-ENOBUFS.patch to limit a warning that might happen
    quite a lot on loaded systems (bsc#956773).
  - Don't wait for 11 minutes to restart ntpd when it has died
    (boo#894031).
* Wed May 04 2016 max@suse.com
  - Update to 4.2.8p7 (bsc#977446):
    * CVE-2016-1547, bsc#977459:
      Validate crypto-NAKs, AKA: CRYPTO-NAK DoS.
    * CVE-2016-1548, bsc#977461: Interleave-pivot
    * CVE-2016-1549, bsc#977451:
      Sybil vulnerability: ephemeral association attack.
    * CVE-2016-1550, bsc#977464: Improve NTP security against buffer
      comparison timing attacks.
    * CVE-2016-1551, bsc#977450:
      Refclock impersonation vulnerability
    * CVE-2016-2516, bsc#977452: Duplicate IPs on unconfig
      directives will cause an assertion botch in ntpd.
    * CVE-2016-2517, bsc#977455: remote configuration trustedkey/
      requestkey/controlkey values are not properly validated.
    * CVE-2016-2518, bsc#977457: Crafted addpeer with hmode > 7
      causes array wraparound with MATCH_ASSOC.
    * CVE-2016-2519, bsc#977458: ctl_getitem() return value not
      always checked.
    * integrate ntp-fork.patch
    * Improve the fixes for:
      CVE-2015-7704, CVE-2015-7705, CVE-2015-7974
  - Restrict the parser in the startup script to the first
    occurrance of "keys" and "controlkey" in ntp.conf (boo#957226).
  - Depend on pps-tools-devel to provide timepps.h header to enable
    Linux PPSAPI support to make GPS devices usefull. (boo#977563)
* Fri Mar 11 2016 max@suse.com
  - CVE-2015-8158, bsc#962966: potential infinite loop in ntpq
  - CVE-2015-8138, bsc#963002: Zero Origin Timestamp Bypass
  - CVE-2015-7978, bsc#963000: Stack exhaustion in recursive
    traversal of restriction list.
  - CVE-2015-7979, bsc#962784: off-path denial of service on
    authenticated broadcast mode
  - CVE-2015-7977, bsc#962970: restriction list NULL pointer
    dereference
  - CVE-2015-7976, bsc#962802: 'ntpq saveconfig' command allows
    dangerous characters in filenames
  - CVE-2015-7975, bsc#962988: nextvar() missing length check in ntpq
  - CVE-2015-7974, bsc#962960: Missing key check allows impersonation
    between authenticated peers
  - CVE-2015-7973, bsc#962995: replay attack on authenticated
    broadcast mode
  - CVE-2015-5300, bsc#951629: MITM attacker can force ntpd to make
    a step larger than the panic threshold
* Mon Mar 07 2016 hsk@imb-jena.de
  - update to 4.2.8p6
    * fixes low- and medium-severity vulnerabilities
      4.2.8p6: CVE-2015-8158 CVE-2015-8138 CVE-2015-7978
      CVE-2015-7979 CVE-2015-7977 CVE-2015-7976 CVE-2015-7975
      CVE-2015-7974 CVE-2015-7973
      4.2.8p5: CVE-2015-5300
    * bug fixes
* Mon Jan 18 2016 wbauer@tmo.at
  - Explicitely run /usr/sbin/sntp to synchronize in start-ntpd. When
    run as cron job, /usr/sbin/ is not in the path, which caused the
    synchronization to fail. (boo#962318)
* Fri Nov 06 2015 max@suse.com
  - Fix ntp-4.2.6p2-ntpq-speedup-782060.patch to not pick arbitraty
    port numbers (bsc#782060).
* Thu Oct 29 2015 max@suse.com
  - Update to 4.2.8p4 to fix several security issues (bsc#951608):
    * CVE-2015-7871: NAK to the Future: Symmetric association
      authentication bypass via crypto-NAK
    * CVE-2015-7855: decodenetnum() will ASSERT botch instead of
      returning FAIL on some bogus values
    * CVE-2015-7854: Password Length Memory Corruption Vulnerability
    * CVE-2015-7853: Invalid length data provided by a custom
      refclock driver could cause a buffer overflow
    * CVE-2015-7852 ntpq atoascii() Memory Corruption Vulnerability
    * CVE-2015-7851 saveconfig Directory Traversal Vulnerability
    * CVE-2015-7850 remote config logfile-keyfile
    * CVE-2015-7849 trusted key use-after-free
    * CVE-2015-7848 mode 7 loop counter underrun
    * CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC
    * CVE-2015-7703 configuration directives "pidfile" and
      "driftfile" should only be allowed locally
    * CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
      validate the origin timestamp field
    * CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
      data packet length checks
    * obsoletes ntp-memlock.patch.
  - Add a controlkey line to /etc/ntp.conf if one does not already
    exist, to allow runtime configuration via ntpq.
  - Use SHA1 instead of MD5 for symmetric keys (bsc#905885).
  - Improve runtime configuration:
    * Read keytype from ntp.conf
    * Don't write ntp keys to syslog.
  - Fix legacy action scripts to pass on command line arguments.
  - Remove ntp.1.gz, it wasn't installed anymore.
  - Remove ntp-4.2.7-rh-manpages.tar.gz and only keep ntptime.8.gz.
    The rest is partially irrelevant, partially redundant and
    potentially outdated (bsc#942587).
  - Remove "kod" from the restrict line in ntp.conf (bsc#944300).
* Fri Sep 04 2015 max@suse.com
  - Add "addserver" as a new legacy action.
  - Fix the comment regarding addserver in ntp.conf (bnc#910063).
* Thu Aug 13 2015 max@suse.com
  - Use ntpq instead of deprecated ntpdc in start-ntpd (bnc#936327).
  - Add a controlkey to ntp.conf to make the above work.
  - Don't let "keysdir" lines in ntp.conf trigger the "keys" parser.
  - Disable mode 7 (ntpdc) again, now that we don't use it anymore.
* Thu Jul 16 2015 max@suse.com
  - Update to version 4.2.8p3 which incorporates all security fixes
    and most other patches we have so far (fate#319040).
    More information on:
    http://archive.ntp.org/ntp4/ChangeLog-stable
  - Disable chroot by default (bnc#926510).
  - Enable ntpdc for backwards compatibility (bnc#920238).
* Tue Apr 07 2015 hsk@imb-jena.de
  - update to 4.2.8p2
    * fixes CVE-2015-1798, CVE-2015-1799 (medium-severity
      vulnerabilities involving private key authentication)
    * bug fixes and enhancements
    * New script: update-leap
* Fri Mar 27 2015 max@suse.com
  - /bin/logger is needed for runtime configuration (bnc#924451).
* Mon Mar 16 2015 hsk@imb-jena.de
  - update to 4.2.8p1
    * fixes CVE-2014-9297, CVE-2014-9298
    * over 30 bugfixes and improvements
  - update to 4.2.8
    * fixes CVE-2014-9293, CVE-2014-9294, CVE-2014-9295, CVE-2014-9296
    * changed Internal NTP Era counters
    * ntpdc responses disabled by default
    * over 1100 issues resolved between the 4.2.6 branch and 4.2.8
  - adjusted patches to fit 4.2.8p1:
    ntp-segfault_on_invalid_device.patch bnc#506908.diff MOD_NANO.diff
  - removed obsolete / now-in-upstream patches:
    ntpd-maxmonmen.patch ntp-code-cleanup.patch ntp-sntp-recverr.patch
    bnc#817893.patch ntp-CVE-2014-9295.patch ntp-CVE-2014-9296.patch
  - changes to spec file:
    * added --datadir (for private perl module needed by ntp scripts)
      and --html-dir (html docs now get installed by "make install")
      to configure options
    * script ntp-wait has moved in source tree
* Mon Mar 16 2015 crrodriguez@opensuse.org
  - *.service: Do not start ntpd when running on containers
    or when CAP_SYS_TIME was dropped from the default capability
    set ( see SYSTEMD-SYSTEM.CONF(5) for details)
* Sun Mar 08 2015 wbauer@tmo.at
  - Explicitely run /usr/sbin/sntp to synchronize in start-ntpd. When
    run as cron job, /usr/sbin/ is not in the path, which caused the
    synchronization to fail. (boo#901751)
* Wed Jan 21 2015 dimstar@opensuse.org
  - Add ntp.NetworkManager: install NetworkManager dipatcher hook:
    if the DHCP Server delivers NTP Servers, accept those and
    configure NTP using the information (boo#900982).
* Sun Jan 04 2015 mpluskal@suse.com
  - Enable avahi support
* Fri Dec 19 2014 max@suse.com
  - bnc#910764: VU#852879 ntp security fixes
    * A potential remote code execution problem was found inside
      ntpd. The functions crypto_recv() (when using autokey
      authentication), ctl_putdata(), and configure() where updated
      to avoid buffer overflows that could be
      exploited. (CVE-2014-9295)
    * Furthermore a problem inside the ntpd error handling was found
      that is missing a return statement. This could also lead to a
      potentially attack vector. (CVE-2014-9296)
  - ntp-CVE-2014-9295.patch and ntp-CVE-2014-9296.patch will be
    obsoleted by the upcoming update to version 4.2.8.
* Tue Dec 02 2014 obs@botter.cc
  - fix typo in version check regarding
    /usr/lib/initscripts/legacy-actions to fix build for <= 13.1

Files

/usr/share/doc/packages/ntp-doc
/usr/share/doc/packages/ntp-doc/html
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/ChangeLog
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/Config.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/Credits.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/DCFloop1.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/GPS167_XY.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/GPS167_XYZ.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/GPS167_Z.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/GPSvsDCF.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-FAQ.dsl
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-FAQ.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-a-faq.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-g-all.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-algo.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-config.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-def.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-refclk.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-related.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-sw-clocks.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-time.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/NTP-s-trouble.htm
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/RefClocks.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/Related.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/RevHist.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/Trouble.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/clockdrift.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/docbook.css
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/ent-defs.sgml
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/f-tick1b.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/hardpps.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/loopstat.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/ntp35f-init.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/pps-delay.png
/usr/share/doc/packages/ntp-doc/html/NTP-FAQ/pps-distrib.png
/usr/share/doc/packages/ntp-doc/html/access.html
/usr/share/doc/packages/ntp-doc/html/accopt.html
/usr/share/doc/packages/ntp-doc/html/assoc.html
/usr/share/doc/packages/ntp-doc/html/audio.html
/usr/share/doc/packages/ntp-doc/html/authentic.html
/usr/share/doc/packages/ntp-doc/html/authopt.html
/usr/share/doc/packages/ntp-doc/html/autokey.html
/usr/share/doc/packages/ntp-doc/html/bugs.html
/usr/share/doc/packages/ntp-doc/html/build.html
/usr/share/doc/packages/ntp-doc/html/clock.html
/usr/share/doc/packages/ntp-doc/html/clockopt.html
/usr/share/doc/packages/ntp-doc/html/cluster.html
/usr/share/doc/packages/ntp-doc/html/comdex.html
/usr/share/doc/packages/ntp-doc/html/config.html
/usr/share/doc/packages/ntp-doc/html/confopt.html
/usr/share/doc/packages/ntp-doc/html/copyright.html
/usr/share/doc/packages/ntp-doc/html/debug.html
/usr/share/doc/packages/ntp-doc/html/decode.html
/usr/share/doc/packages/ntp-doc/html/discipline.html
/usr/share/doc/packages/ntp-doc/html/discover.html
/usr/share/doc/packages/ntp-doc/html/drivers
/usr/share/doc/packages/ntp-doc/html/drivers/driver1.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver10.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver11.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver12.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver16.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver18.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver19.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver20.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver22.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver26.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver27.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver28.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver29.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver3.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver30.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver31.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver32.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver33.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver34.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver35.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver36.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver37.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver38.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver39.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver4.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver40-ja.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver40.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver42.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver43.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver44.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver45.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver46.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver5.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver6.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver7.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver8.html
/usr/share/doc/packages/ntp-doc/html/drivers/driver9.html
/usr/share/doc/packages/ntp-doc/html/drivers/icons
/usr/share/doc/packages/ntp-doc/html/drivers/icons/home.gif
/usr/share/doc/packages/ntp-doc/html/drivers/icons/mail2.gif
/usr/share/doc/packages/ntp-doc/html/drivers/mx4200data.html
/usr/share/doc/packages/ntp-doc/html/drivers/oncore-shmem.html
/usr/share/doc/packages/ntp-doc/html/drivers/scripts
/usr/share/doc/packages/ntp-doc/html/drivers/scripts/footer.txt
/usr/share/doc/packages/ntp-doc/html/drivers/scripts/style.css
/usr/share/doc/packages/ntp-doc/html/drivers/tf582_4.html
/usr/share/doc/packages/ntp-doc/html/extern.html
/usr/share/doc/packages/ntp-doc/html/filter.html
/usr/share/doc/packages/ntp-doc/html/hints
/usr/share/doc/packages/ntp-doc/html/hints.html
/usr/share/doc/packages/ntp-doc/html/hints/a-ux
/usr/share/doc/packages/ntp-doc/html/hints/aix
/usr/share/doc/packages/ntp-doc/html/hints/bsdi
/usr/share/doc/packages/ntp-doc/html/hints/changes
/usr/share/doc/packages/ntp-doc/html/hints/decosf1
/usr/share/doc/packages/ntp-doc/html/hints/decosf2
/usr/share/doc/packages/ntp-doc/html/hints/freebsd
/usr/share/doc/packages/ntp-doc/html/hints/hpux
/usr/share/doc/packages/ntp-doc/html/hints/linux
/usr/share/doc/packages/ntp-doc/html/hints/mpeix
/usr/share/doc/packages/ntp-doc/html/hints/notes-xntp-v3
/usr/share/doc/packages/ntp-doc/html/hints/parse
/usr/share/doc/packages/ntp-doc/html/hints/refclocks
/usr/share/doc/packages/ntp-doc/html/hints/rs6000
/usr/share/doc/packages/ntp-doc/html/hints/sco.html
/usr/share/doc/packages/ntp-doc/html/hints/sgi
/usr/share/doc/packages/ntp-doc/html/hints/solaris-dosynctodr.html
/usr/share/doc/packages/ntp-doc/html/hints/solaris.html
/usr/share/doc/packages/ntp-doc/html/hints/solaris.xtra.4023118
/usr/share/doc/packages/ntp-doc/html/hints/solaris.xtra.4095849
/usr/share/doc/packages/ntp-doc/html/hints/solaris.xtra.S99ntpd
/usr/share/doc/packages/ntp-doc/html/hints/solaris.xtra.patchfreq
/usr/share/doc/packages/ntp-doc/html/hints/sun4
/usr/share/doc/packages/ntp-doc/html/hints/svr4-dell
/usr/share/doc/packages/ntp-doc/html/hints/svr4_package
/usr/share/doc/packages/ntp-doc/html/hints/todo
/usr/share/doc/packages/ntp-doc/html/hints/vxworks.html
/usr/share/doc/packages/ntp-doc/html/hints/winnt.html
/usr/share/doc/packages/ntp-doc/html/history.html
/usr/share/doc/packages/ntp-doc/html/howto.html
/usr/share/doc/packages/ntp-doc/html/huffpuff.html
/usr/share/doc/packages/ntp-doc/html/icons
/usr/share/doc/packages/ntp-doc/html/icons/home.gif
/usr/share/doc/packages/ntp-doc/html/icons/mail2.gif
/usr/share/doc/packages/ntp-doc/html/icons/sitemap.png
/usr/share/doc/packages/ntp-doc/html/index.html
/usr/share/doc/packages/ntp-doc/html/kern.html
/usr/share/doc/packages/ntp-doc/html/kernpps.html
/usr/share/doc/packages/ntp-doc/html/keygen.html
/usr/share/doc/packages/ntp-doc/html/leap.html
/usr/share/doc/packages/ntp-doc/html/miscopt.html
/usr/share/doc/packages/ntp-doc/html/monopt.html
/usr/share/doc/packages/ntp-doc/html/msyslog.html
/usr/share/doc/packages/ntp-doc/html/ntp-wait.html
/usr/share/doc/packages/ntp-doc/html/ntp_conf.html
/usr/share/doc/packages/ntp-doc/html/ntpd.html
/usr/share/doc/packages/ntp-doc/html/ntpdate.html
/usr/share/doc/packages/ntp-doc/html/ntpdc.html
/usr/share/doc/packages/ntp-doc/html/ntpdsim.html
/usr/share/doc/packages/ntp-doc/html/ntpdsim_new.html
/usr/share/doc/packages/ntp-doc/html/ntpq.html
/usr/share/doc/packages/ntp-doc/html/ntptime.html
/usr/share/doc/packages/ntp-doc/html/ntptrace.html
/usr/share/doc/packages/ntp-doc/html/orphan.html
/usr/share/doc/packages/ntp-doc/html/parsedata.html
/usr/share/doc/packages/ntp-doc/html/parsenew.html
/usr/share/doc/packages/ntp-doc/html/pic
/usr/share/doc/packages/ntp-doc/html/pic/9400n.jpg
/usr/share/doc/packages/ntp-doc/html/pic/alice11.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice13.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice15.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice23.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice31.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice32.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice35.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice38.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice44.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice47.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice51.gif
/usr/share/doc/packages/ntp-doc/html/pic/alice61.gif
/usr/share/doc/packages/ntp-doc/html/pic/barnstable.gif
/usr/share/doc/packages/ntp-doc/html/pic/beaver.gif
/usr/share/doc/packages/ntp-doc/html/pic/boom3.gif
/usr/share/doc/packages/ntp-doc/html/pic/boom3a.gif
/usr/share/doc/packages/ntp-doc/html/pic/boom4.gif
/usr/share/doc/packages/ntp-doc/html/pic/broad.gif
/usr/share/doc/packages/ntp-doc/html/pic/bustardfly.gif
/usr/share/doc/packages/ntp-doc/html/pic/c51.jpg
/usr/share/doc/packages/ntp-doc/html/pic/description.jpg
/usr/share/doc/packages/ntp-doc/html/pic/discipline.gif
/usr/share/doc/packages/ntp-doc/html/pic/dogsnake.gif
/usr/share/doc/packages/ntp-doc/html/pic/driver29.gif
/usr/share/doc/packages/ntp-doc/html/pic/driver43_1.gif
/usr/share/doc/packages/ntp-doc/html/pic/driver43_2.jpg
/usr/share/doc/packages/ntp-doc/html/pic/fg6021.gif
/usr/share/doc/packages/ntp-doc/html/pic/fg6039.jpg
/usr/share/doc/packages/ntp-doc/html/pic/fig_3_1.gif
/usr/share/doc/packages/ntp-doc/html/pic/flatheads.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt1.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt2.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt3.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt4.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt5.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt6.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt7.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt8.gif
/usr/share/doc/packages/ntp-doc/html/pic/flt9.gif
/usr/share/doc/packages/ntp-doc/html/pic/freq1211.gif
/usr/share/doc/packages/ntp-doc/html/pic/gadget.jpg
/usr/share/doc/packages/ntp-doc/html/pic/gps167.jpg
/usr/share/doc/packages/ntp-doc/html/pic/group.gif
/usr/share/doc/packages/ntp-doc/html/pic/hornraba.gif
/usr/share/doc/packages/ntp-doc/html/pic/igclock.gif
/usr/share/doc/packages/ntp-doc/html/pic/neoclock4x.gif
/usr/share/doc/packages/ntp-doc/html/pic/offset1211.gif
/usr/share/doc/packages/ntp-doc/html/pic/oncore_evalbig.gif
/usr/share/doc/packages/ntp-doc/html/pic/oncore_remoteant.jpg
/usr/share/doc/packages/ntp-doc/html/pic/oncore_utplusbig.gif
/usr/share/doc/packages/ntp-doc/html/pic/oz2.gif
/usr/share/doc/packages/ntp-doc/html/pic/panda.gif
/usr/share/doc/packages/ntp-doc/html/pic/pd_om006.gif
/usr/share/doc/packages/ntp-doc/html/pic/pd_om011.gif
/usr/share/doc/packages/ntp-doc/html/pic/peer.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo1a.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo3a.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo4.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo5.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo6.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo7.gif
/usr/share/doc/packages/ntp-doc/html/pic/pogo8.gif
/usr/share/doc/packages/ntp-doc/html/pic/pzf509.jpg
/usr/share/doc/packages/ntp-doc/html/pic/pzf511.jpg
/usr/share/doc/packages/ntp-doc/html/pic/rabbit.gif
/usr/share/doc/packages/ntp-doc/html/pic/radio2.jpg
/usr/share/doc/packages/ntp-doc/html/pic/sheepb.jpg
/usr/share/doc/packages/ntp-doc/html/pic/stack1a.jpg
/usr/share/doc/packages/ntp-doc/html/pic/stats.gif
/usr/share/doc/packages/ntp-doc/html/pic/sx5.gif
/usr/share/doc/packages/ntp-doc/html/pic/thunderbolt.jpg
/usr/share/doc/packages/ntp-doc/html/pic/time1.gif
/usr/share/doc/packages/ntp-doc/html/pic/tonea.gif
/usr/share/doc/packages/ntp-doc/html/pic/tribeb.gif
/usr/share/doc/packages/ntp-doc/html/pic/wingdorothy.gif
/usr/share/doc/packages/ntp-doc/html/poll.html
/usr/share/doc/packages/ntp-doc/html/pps.html
/usr/share/doc/packages/ntp-doc/html/prefer.html
/usr/share/doc/packages/ntp-doc/html/quick.html
/usr/share/doc/packages/ntp-doc/html/rate.html
/usr/share/doc/packages/ntp-doc/html/rdebug.html
/usr/share/doc/packages/ntp-doc/html/refclock.html
/usr/share/doc/packages/ntp-doc/html/release.html
/usr/share/doc/packages/ntp-doc/html/scripts
/usr/share/doc/packages/ntp-doc/html/scripts/accopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/audio.txt
/usr/share/doc/packages/ntp-doc/html/scripts/authopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/clockopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/command.txt
/usr/share/doc/packages/ntp-doc/html/scripts/config.txt
/usr/share/doc/packages/ntp-doc/html/scripts/confopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/external.txt
/usr/share/doc/packages/ntp-doc/html/scripts/footer.txt
/usr/share/doc/packages/ntp-doc/html/scripts/hand.txt
/usr/share/doc/packages/ntp-doc/html/scripts/install.txt
/usr/share/doc/packages/ntp-doc/html/scripts/manual.txt
/usr/share/doc/packages/ntp-doc/html/scripts/misc.txt
/usr/share/doc/packages/ntp-doc/html/scripts/miscopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/monopt.txt
/usr/share/doc/packages/ntp-doc/html/scripts/refclock.txt
/usr/share/doc/packages/ntp-doc/html/scripts/special.txt
/usr/share/doc/packages/ntp-doc/html/scripts/style.css
/usr/share/doc/packages/ntp-doc/html/select.html
/usr/share/doc/packages/ntp-doc/html/sitemap.html
/usr/share/doc/packages/ntp-doc/html/sntp.html
/usr/share/doc/packages/ntp-doc/html/stats.html
/usr/share/doc/packages/ntp-doc/html/tickadj.html
/usr/share/doc/packages/ntp-doc/html/warp.html
/usr/share/doc/packages/ntp-doc/html/xleave.html
/usr/share/doc/packages/ntp-doc/ntp-keygen.html
/usr/share/doc/packages/ntp-doc/ntp-wait.html
/usr/share/doc/packages/ntp-doc/ntp.conf.html
/usr/share/doc/packages/ntp-doc/ntp.keys.html
/usr/share/doc/packages/ntp-doc/ntpd.html
/usr/share/doc/packages/ntp-doc/ntpdc.html
/usr/share/doc/packages/ntp-doc/ntpq.html
/usr/share/doc/packages/ntp-doc/ntpsnmpd.html
/usr/share/doc/packages/ntp-doc/ntpsweep.html
/usr/share/doc/packages/ntp-doc/ntptrace.html
/usr/share/doc/packages/ntp-doc/sntp.html
/usr/share/doc/packages/ntp-doc/update-leap.html


Generated by rpm2html 1.8.1

Fabrice Bellet, Mon Nov 29 23:59:34 2021