|
|
Subscribe / Log in / New account

A security review of three NTP implementations

A security review of three NTP implementations

Posted Oct 2, 2017 15:34 UTC (Mon) by smurf (subscriber, #17840)
Parent article: A security review of three NTP implementations

Just checked out the Chrony sources and had a look.

This is one of the most well-commented and -assertion-sprinkled code bases I have seen lately. Exemplary.


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds