A security review of three NTP implementations
A security review of three NTP implementations
Posted Oct 2, 2017 15:15 UTC (Mon) by SEJeff (guest, #51588)Parent article: A security review of three NTP implementations
The most obvious reasons chrony is more secure is its apparent simplicity compared to the legacy mess that is ntpd riddled with ancient landmines and old coding standards. It is one of the reasons they mention security reasons to using chrony in the RHEL7 documentation:
https://access.redhat.com/documentation/en-us/red_hat_ent...