|
|
Subscribe / Log in / New account

A security review of three NTP implementations

A security review of three NTP implementations

Posted Oct 2, 2017 15:15 UTC (Mon) by SEJeff (guest, #51588)
Parent article: A security review of three NTP implementations

The most obvious reasons chrony is more secure is its apparent simplicity compared to the legacy mess that is ntpd riddled with ancient landmines and old coding standards. It is one of the reasons they mention security reasons to using chrony in the RHEL7 documentation:

https://access.redhat.com/documentation/en-us/red_hat_ent...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds