http://bk1.ntp.org/ntp-stable/?PAGE=patch&REV=550a80b0iGyIv4t9J1GJ_74V_eEx4A http://bugs.ntp.org/show_bug.cgi?id=2781 diff -Naurp ntp-4.2.6p5/ntpd/ntp_proto.c ntp-4.2.6p5.oden/ntpd/ntp_proto.c --- ntp-4.2.6p5/ntpd/ntp_proto.c 2015-04-08 09:09:31.000000000 +0200 +++ ntp-4.2.6p5.oden/ntpd/ntp_proto.c 2015-04-08 09:11:11.000000000 +0200 @@ -1102,16 +1102,6 @@ receive( } /* - * Update the state variables. - */ - if (peer->flip == 0) { - if (hismode != MODE_BROADCAST) - peer->rec = p_xmt; - peer->dst = rbufp->recv_time; - } - peer->xmt = p_xmt; - - /* * If this is a crypto_NAK, the server cannot authenticate a * client packet. The server might have just changed keys. Clear * the association and restart the protocol. @@ -1158,6 +1148,16 @@ receive( } /* + * Update the state variables. + */ + if (peer->flip == 0) { + if (hismode != MODE_BROADCAST) + peer->rec = p_xmt; + peer->dst = rbufp->recv_time; + } + peer->xmt = p_xmt; + + /* * Set the peer ppoll to the maximum of the packet ppoll and the * peer minpoll. If a kiss-o'-death, set the peer minpoll to * this maximumn and advance the headway to give the sender some