A security review of three NTP implementations
A security review of three NTP implementations
Posted Oct 2, 2017 15:34 UTC (Mon) by smurf (subscriber, #17840)Parent article: A security review of three NTP implementations
Just checked out the Chrony sources and had a look.
This is one of the most well-commented and -assertion-sprinkled code bases I have seen lately. Exemplary.