Browse Source

do not encourage random uppercasing;

OPENBSD_5_8
jmc 9 years ago
parent
commit
62357f829c
2 changed files with 6 additions and 8 deletions
  1. +3
    -4
      src/usr.sbin/ntpd/ntpd.8
  2. +3
    -4
      src/usr.sbin/ntpd/ntpd.conf.5

+ 3
- 4
src/usr.sbin/ntpd/ntpd.8 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ntpd.8,v 1.38 2015/03/14 04:11:02 deraadt Exp $
.\" $OpenBSD: ntpd.8,v 1.39 2015/03/26 20:34:54 jmc Exp $
.\" .\"
.\" Copyright (c) 2003, 2004, 2006 Henning Brauer <henning@openbsd.org> .\" Copyright (c) 2003, 2004, 2006 Henning Brauer <henning@openbsd.org>
.\" .\"
@ -14,7 +14,7 @@
.\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT .\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
.\" OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.Dd $Mdocdate: March 14 2015 $
.Dd $Mdocdate: March 26 2015 $
.Dt NTPD 8 .Dt NTPD 8
.Os .Os
.Sh NAME .Sh NAME
@ -40,8 +40,7 @@ and the Network Time Protocol version 3,
as described in RFC 1305. as described in RFC 1305.
Time can also be fetched from TLS HTTPS servers to reduce the Time can also be fetched from TLS HTTPS servers to reduce the
impact of unauthenticated NTP impact of unauthenticated NTP
.Sq Man-In-The-Middle
attacks.
man-in-the-middle attacks.
.Pp .Pp
The options are as follows: The options are as follows:
.Bl -tag -width "-f fileXXX" .Bl -tag -width "-f fileXXX"


+ 3
- 4
src/usr.sbin/ntpd/ntpd.conf.5 View File

@ -1,4 +1,4 @@
.\" $OpenBSD: ntpd.conf.5,v 1.29 2015/02/16 19:25:35 jmc Exp $
.\" $OpenBSD: ntpd.conf.5,v 1.30 2015/03/26 20:34:54 jmc Exp $
.\" .\"
.\" Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org> .\" Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
.\" .\"
@ -14,7 +14,7 @@
.\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT .\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT
.\" OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
.\" .\"
.Dd $Mdocdate: February 16 2015 $
.Dd $Mdocdate: March 26 2015 $
.Dt NTPD.CONF 5 .Dt NTPD.CONF 5
.Os .Os
.Sh NAME .Sh NAME
@ -184,8 +184,7 @@ from trusted HTTPS servers via TLS.
This time information is not used for precision but acts as an This time information is not used for precision but acts as an
authenticated constraint, authenticated constraint,
thereby reducing the impact of unauthenticated NTP thereby reducing the impact of unauthenticated NTP
.Sq Man-In-The-Middle
attacks.
man-in-the-middle attacks.
Received NTP packets with time information falling outside of a range Received NTP packets with time information falling outside of a range
near the constraint will be discarded and such NTP servers near the constraint will be discarded and such NTP servers
will be marked as invalid. will be marked as invalid.


Loading…
Cancel
Save