[ntp:hackers] [ntp-dev] pls test new interface code

Danny Mayer mayer at ntp.isc.org
Sun Jul 23 03:24:58 UTC 2006


Spam detection software, running on the system "maccarony.ntp.org", has
identified this incoming email as possible spam.  The original message
has been attached to this so you can view it (if it isn't spam) or label
similar future email.  If you have any questions, see
https://www.eecis.udel.edu/service/ for details.

Content preview:  Frank Kardel wrote: > One of the new major features in
  ntp-dev aside from autogen > is the dynamic interface code. This code
  solves the long standing > problem (bug #51) that ntpd would loose
  contact with the world > when the IP address changed (e.g. ppp,
  "Zwangstrennung", WLAN). > > The way it works is that ntpd repeatedly
  scans the list of network > interfaces and reconfigures when changes are
  found. On systems > that provide the routing socket interface (*BSD and
  derived) this > is almost instantaneous. On all other systems (Windows,
  Linux and the rest) > the interface list is scanned at regular intervals
  (5 minutes for now). [...] 

Content analysis details:   (6.5 points, 4.1 required)

 pts rule name              description
---- ---------------------- --------------------------------------------------
 3.2 HELO_DYNAMIC_IPADDR2   Relay HELO'd using suspicious hostname (IP addr
                            2)
 3.3 HELO_DYNAMIC_HCC       Relay HELO'd using suspicious hostname (HCC)




More information about the hackers mailing list