Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1171640 - NTP drops requests when sourceport is below 123
NTP drops requests when sourceport is below 123
Status: CLOSED ERRATA
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: ntp (Show other bugs)
7.1
Unspecified Linux
unspecified Severity medium
: rc
: ---
Assigned To: Miroslav Lichvar
Jakub Prokes
:
Depends On: 1171630
Blocks:
  Show dependency treegraph
 
Reported: 2014-12-08 04:51 EST by Miroslav Lichvar
Modified: 2015-11-19 03:37 EST (History)
6 users (show)

See Also:
Fixed In Version: ntp-4.2.6p5-20.el7
Doc Type: Bug Fix
Doc Text:
The ntpd daemon dropped incoming NTP packets if their source port was lower than 123 (the NTP port). As a consequence, clients behind Network Address Translation (NAT) were unable to synchronize with the server if their source port was translated to ports below 123. With this update, ntpd no longer checks the source port number, and clients behind NAT are now able to correctly synchronize with the server.
Story Points: ---
Clone Of: 1171630
Environment:
Last Closed: 2015-11-19 03:37:38 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Network Time Protocol 2174 None None None Never
Red Hat Product Errata RHSA-2015:2231 normal SHIPPED_LIVE Moderate: ntp security, bug fix, and enhancement update 2015-11-19 04:03:04 EST

  None (edit)
Comment 7 errata-xmlrpc 2015-11-19 03:37:38 EST
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2015-2231.html

Note You need to log in before you can comment on or make changes to this bug.