NEWS revision 1.1.1.3.4.1 1 1.1.1.3 christos ---
2 1.1.1.3.4.1 riz NTP 4.2.8 (Harlan Stenn <stenn (a] ntp.org>, 2014/12/18)
3 1.1.1.3.4.1 riz
4 1.1.1.3.4.1 riz Focus: Security and Bug fixes, enhancements.
5 1.1.1.3.4.1 riz
6 1.1.1.3.4.1 riz Severity: HIGH
7 1.1.1.3.4.1 riz
8 1.1.1.3.4.1 riz In addition to bug fixes and enhancements, this release fixes the
9 1.1.1.3.4.1 riz following high-severity vulnerabilities:
10 1.1.1.3.4.1 riz
11 1.1.1.3.4.1 riz * Weak default key in config_auth().
12 1.1.1.3.4.1 riz
13 1.1.1.3.4.1 riz References: [Sec 2665] / CVE-2014-9293 / VU#852879
14 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
15 1.1.1.3.4.1 riz Vulnerable Versions: all releases prior to 4.2.7p11
16 1.1.1.3.4.1 riz Date Resolved: 28 Jan 2010
17 1.1.1.3.4.1 riz
18 1.1.1.3.4.1 riz Summary: If no 'auth' key is set in the configuration file, ntpd
19 1.1.1.3.4.1 riz would generate a random key on the fly. There were two
20 1.1.1.3.4.1 riz problems with this: 1) the generated key was 31 bits in size,
21 1.1.1.3.4.1 riz and 2) it used the (now weak) ntp_random() function, which was
22 1.1.1.3.4.1 riz seeded with a 32-bit value and could only provide 32 bits of
23 1.1.1.3.4.1 riz entropy. This was sufficient back in the late 1990s when the
24 1.1.1.3.4.1 riz code was written. Not today.
25 1.1.1.3.4.1 riz
26 1.1.1.3.4.1 riz Mitigation: Upgrade to 4.2.7p11 or later.
27 1.1.1.3.4.1 riz
28 1.1.1.3.4.1 riz Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
29 1.1.1.3.4.1 riz of the Google Security Team.
30 1.1.1.3.4.1 riz
31 1.1.1.3.4.1 riz * Non-cryptographic random number generator with weak seed used by
32 1.1.1.3.4.1 riz ntp-keygen to generate symmetric keys.
33 1.1.1.3.4.1 riz
34 1.1.1.3.4.1 riz References: [Sec 2666] / CVE-2014-9294 / VU#852879
35 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
36 1.1.1.3.4.1 riz Vulnerable Versions: All NTP4 releases before 4.2.7p230
37 1.1.1.3.4.1 riz Date Resolved: Dev (4.2.7p230) 01 Nov 2011
38 1.1.1.3.4.1 riz
39 1.1.1.3.4.1 riz Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
40 1.1.1.3.4.1 riz prepare a random number generator that was of good quality back
41 1.1.1.3.4.1 riz in the late 1990s. The random numbers produced was then used to
42 1.1.1.3.4.1 riz generate symmetric keys. In ntp-4.2.8 we use a current-technology
43 1.1.1.3.4.1 riz cryptographic random number generator, either RAND_bytes from
44 1.1.1.3.4.1 riz OpenSSL, or arc4random().
45 1.1.1.3.4.1 riz
46 1.1.1.3.4.1 riz Mitigation: Upgrade to 4.2.7p230 or later.
47 1.1.1.3.4.1 riz
48 1.1.1.3.4.1 riz Credit: This vulnerability was discovered in ntp-4.2.6 by
49 1.1.1.3.4.1 riz Stephen Roettger of the Google Security Team.
50 1.1.1.3.4.1 riz
51 1.1.1.3.4.1 riz * Buffer overflow in crypto_recv()
52 1.1.1.3.4.1 riz
53 1.1.1.3.4.1 riz References: Sec 2667 / CVE-2014-9295 / VU#852879
54 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
55 1.1.1.3.4.1 riz Versions: All releases before 4.2.8
56 1.1.1.3.4.1 riz Date Resolved: Stable (4.2.8) 18 Dec 2014
57 1.1.1.3.4.1 riz
58 1.1.1.3.4.1 riz Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
59 1.1.1.3.4.1 riz file contains a 'crypto pw ...' directive) a remote attacker
60 1.1.1.3.4.1 riz can send a carefully crafted packet that can overflow a stack
61 1.1.1.3.4.1 riz buffer and potentially allow malicious code to be executed
62 1.1.1.3.4.1 riz with the privilege level of the ntpd process.
63 1.1.1.3.4.1 riz
64 1.1.1.3.4.1 riz Mitigation: Upgrade to 4.2.8, or later, or
65 1.1.1.3.4.1 riz Disable Autokey Authentication by removing, or commenting out,
66 1.1.1.3.4.1 riz all configuration directives beginning with the crypto keyword
67 1.1.1.3.4.1 riz in your ntp.conf file.
68 1.1.1.3.4.1 riz
69 1.1.1.3.4.1 riz Credit: This vulnerability was discovered by Stephen Roettger of the
70 1.1.1.3.4.1 riz Google Security Team.
71 1.1.1.3.4.1 riz
72 1.1.1.3.4.1 riz * Buffer overflow in ctl_putdata()
73 1.1.1.3.4.1 riz
74 1.1.1.3.4.1 riz References: Sec 2668 / CVE-2014-9295 / VU#852879
75 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
76 1.1.1.3.4.1 riz Versions: All NTP4 releases before 4.2.8
77 1.1.1.3.4.1 riz Date Resolved: Stable (4.2.8) 18 Dec 2014
78 1.1.1.3.4.1 riz
79 1.1.1.3.4.1 riz Summary: A remote attacker can send a carefully crafted packet that
80 1.1.1.3.4.1 riz can overflow a stack buffer and potentially allow malicious
81 1.1.1.3.4.1 riz code to be executed with the privilege level of the ntpd process.
82 1.1.1.3.4.1 riz
83 1.1.1.3.4.1 riz Mitigation: Upgrade to 4.2.8, or later.
84 1.1.1.3.4.1 riz
85 1.1.1.3.4.1 riz Credit: This vulnerability was discovered by Stephen Roettger of the
86 1.1.1.3.4.1 riz Google Security Team.
87 1.1.1.3.4.1 riz
88 1.1.1.3.4.1 riz * Buffer overflow in configure()
89 1.1.1.3.4.1 riz
90 1.1.1.3.4.1 riz References: Sec 2669 / CVE-2014-9295 / VU#852879
91 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
92 1.1.1.3.4.1 riz Versions: All NTP4 releases before 4.2.8
93 1.1.1.3.4.1 riz Date Resolved: Stable (4.2.8) 18 Dec 2014
94 1.1.1.3.4.1 riz
95 1.1.1.3.4.1 riz Summary: A remote attacker can send a carefully crafted packet that
96 1.1.1.3.4.1 riz can overflow a stack buffer and potentially allow malicious
97 1.1.1.3.4.1 riz code to be executed with the privilege level of the ntpd process.
98 1.1.1.3.4.1 riz
99 1.1.1.3.4.1 riz Mitigation: Upgrade to 4.2.8, or later.
100 1.1.1.3.4.1 riz
101 1.1.1.3.4.1 riz Credit: This vulnerability was discovered by Stephen Roettger of the
102 1.1.1.3.4.1 riz Google Security Team.
103 1.1.1.3.4.1 riz
104 1.1.1.3.4.1 riz * receive(): missing return on error
105 1.1.1.3.4.1 riz
106 1.1.1.3.4.1 riz References: Sec 2670 / CVE-2014-9296 / VU#852879
107 1.1.1.3.4.1 riz CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
108 1.1.1.3.4.1 riz Versions: All NTP4 releases before 4.2.8
109 1.1.1.3.4.1 riz Date Resolved: Stable (4.2.8) 18 Dec 2014
110 1.1.1.3.4.1 riz
111 1.1.1.3.4.1 riz Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
112 1.1.1.3.4.1 riz the code path where an error was detected, which meant
113 1.1.1.3.4.1 riz processing did not stop when a specific rare error occurred.
114 1.1.1.3.4.1 riz We haven't found a way for this bug to affect system integrity.
115 1.1.1.3.4.1 riz If there is no way to affect system integrity the base CVSS
116 1.1.1.3.4.1 riz score for this bug is 0. If there is one avenue through which
117 1.1.1.3.4.1 riz system integrity can be partially affected, the base score
118 1.1.1.3.4.1 riz becomes a 5. If system integrity can be partially affected
119 1.1.1.3.4.1 riz via all three integrity metrics, the CVSS base score become 7.5.
120 1.1.1.3.4.1 riz
121 1.1.1.3.4.1 riz Mitigation:
122 1.1.1.3.4.1 riz Upgrade to 4.2.8, or later,
123 1.1.1.3.4.1 riz or Remove or comment out all configuration directives
124 1.1.1.3.4.1 riz beginning with the crypto keyword in your ntp.conf file.
125 1.1.1.3.4.1 riz
126 1.1.1.3.4.1 riz Credit: This vulnerability was discovered by Stephen Roettger of the
127 1.1.1.3.4.1 riz Google Security Team.
128 1.1.1.3.4.1 riz
129 1.1.1.3.4.1 riz See http://support.ntp.org/security for more information.
130 1.1.1.3.4.1 riz
131 1.1.1.3.4.1 riz New features / changes in this release:
132 1.1.1.3 christos
133 1.1.1.3 christos Important Changes
134 1.1.1.3 christos
135 1.1.1.3 christos * Internal NTP Era counters
136 1.1.1.3 christos
137 1.1.1.3.4.1 riz The internal counters that track the "era" (range of years) we are in
138 1.1.1.3 christos rolls over every 136 years'. The current "era" started at the stroke of
139 1.1.1.3 christos midnight on 1 Jan 1900, and ends just before the stroke of midnight on
140 1.1.1.3 christos 1 Jan 2036.
141 1.1.1.3 christos In the past, we have used the "midpoint" of the range to decide which
142 1.1.1.3 christos era we were in. Given the longevity of some products, it became clear
143 1.1.1.3 christos that it would be more functional to "look back" less, and "look forward"
144 1.1.1.3 christos more. We now compile a timestamp into the ntpd executable and when we
145 1.1.1.3 christos get a timestamp we us the "built-on" to tell us what era we are in.
146 1.1.1.3 christos This check "looks back" 10 years, and "looks forward" 126 years.
147 1.1.1.3 christos
148 1.1.1.3 christos * ntpdc responses disabled by default
149 1.1.1.3 christos
150 1.1.1.3 christos Dave Hart writes:
151 1.1.1.3 christos
152 1.1.1.3 christos For a long time, ntpq and its mostly text-based mode 6 (control)
153 1.1.1.3 christos protocol have been preferred over ntpdc and its mode 7 (private
154 1.1.1.3 christos request) protocol for runtime queries and configuration. There has
155 1.1.1.3 christos been a goal of deprecating ntpdc, previously held back by numerous
156 1.1.1.3 christos capabilities exposed by ntpdc with no ntpq equivalent. I have been
157 1.1.1.3 christos adding commands to ntpq to cover these cases, and I believe I've
158 1.1.1.3 christos covered them all, though I've not compared command-by-command
159 1.1.1.3 christos recently.
160 1.1.1.3 christos
161 1.1.1.3 christos As I've said previously, the binary mode 7 protocol involves a lot of
162 1.1.1.3 christos hand-rolled structure layout and byte-swapping code in both ntpd and
163 1.1.1.3 christos ntpdc which is hard to get right. As ntpd grows and changes, the
164 1.1.1.3 christos changes are difficult to expose via ntpdc while maintaining forward
165 1.1.1.3 christos and backward compatibility between ntpdc and ntpd. In contrast,
166 1.1.1.3 christos ntpq's text-based, label=value approach involves more code reuse and
167 1.1.1.3 christos allows compatible changes without extra work in most cases.
168 1.1.1.3 christos
169 1.1.1.3 christos Mode 7 has always been defined as vendor/implementation-specific while
170 1.1.1.3.4.1 riz mode 6 is described in RFC 1305 and intended to be open to interoperate
171 1.1.1.3 christos with other implementations. There is an early draft of an updated
172 1.1.1.3 christos mode 6 description that likely will join the other NTPv4 RFCs
173 1.1.1.3 christos eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01)
174 1.1.1.3 christos
175 1.1.1.3 christos For these reasons, ntpd 4.2.7p230 by default disables processing of
176 1.1.1.3 christos ntpdc queries, reducing ntpd's attack surface and functionally
177 1.1.1.3 christos deprecating ntpdc. If you are in the habit of using ntpdc for certain
178 1.1.1.3 christos operations, please try the ntpq equivalent. If there's no equivalent,
179 1.1.1.3 christos please open a bug report at http://bugs.ntp.org./
180 1.1.1.3 christos
181 1.1.1.3.4.1 riz In addition to the above, over 1100 issues have been resolved between
182 1.1.1.3.4.1 riz the 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution
183 1.1.1.3.4.1 riz lists these.
184 1.1.1.3.4.1 riz
185 1.1.1.2 kardel ---
186 1.1.1.2 kardel NTP 4.2.6p5 (Harlan Stenn <stenn (a] ntp.org>, 2011/12/24)
187 1.1.1.2 kardel
188 1.1.1.2 kardel Focus: Bug fixes
189 1.1.1.2 kardel
190 1.1.1.2 kardel Severity: Medium
191 1.1.1.2 kardel
192 1.1.1.2 kardel This is a recommended upgrade.
193 1.1.1.2 kardel
194 1.1.1.2 kardel This release updates sys_rootdisp and sys_jitter calculations to match the
195 1.1.1.2 kardel RFC specification, fixes a potential IPv6 address matching error for the
196 1.1.1.2 kardel "nic" and "interface" configuration directives, suppresses the creation of
197 1.1.1.2 kardel extraneous ephemeral associations for certain broadcastclient and
198 1.1.1.2 kardel multicastclient configurations, cleans up some ntpq display issues, and
199 1.1.1.2 kardel includes improvements to orphan mode, minor bugs fixes and code clean-ups.
200 1.1.1.2 kardel
201 1.1.1.2 kardel New features / changes in this release:
202 1.1.1.2 kardel
203 1.1.1.2 kardel ntpd
204 1.1.1.2 kardel
205 1.1.1.2 kardel * Updated "nic" and "interface" IPv6 address handling to prevent
206 1.1.1.2 kardel mismatches with localhost [::1] and wildcard [::] which resulted from
207 1.1.1.2 kardel using the address/prefix format (e.g. fe80::/64)
208 1.1.1.2 kardel * Fix orphan mode stratum incorrectly counting to infinity
209 1.1.1.2 kardel * Orphan parent selection metric updated to includes missing ntohl()
210 1.1.1.2 kardel * Non-printable stratum 16 refid no longer sent to ntp
211 1.1.1.2 kardel * Duplicate ephemeral associations suppressed for broadcastclient and
212 1.1.1.2 kardel multicastclient without broadcastdelay
213 1.1.1.2 kardel * Exclude undetermined sys_refid from use in loopback TEST12
214 1.1.1.2 kardel * Exclude MODE_SERVER responses from KoD rate limiting
215 1.1.1.2 kardel * Include root delay in clock_update() sys_rootdisp calculations
216 1.1.1.2 kardel * get_systime() updated to exclude sys_residual offset (which only
217 1.1.1.2 kardel affected bits "below" sys_tick, the precision threshold)
218 1.1.1.2 kardel * sys.peer jitter weighting corrected in sys_jitter calculation
219 1.1.1.2 kardel
220 1.1.1.2 kardel ntpq
221 1.1.1.2 kardel
222 1.1.1.2 kardel * -n option extended to include the billboard "server" column
223 1.1.1.2 kardel * IPv6 addresses in the local column truncated to prevent overruns
224 1.1.1.2 kardel
225 1.1.1.2 kardel ---
226 1.1.1.2 kardel NTP 4.2.6p4 (Harlan Stenn <stenn (a] ntp.org>, 2011/09/22)
227 1.1.1.2 kardel
228 1.1.1.2 kardel Focus: Bug fixes and portability improvements
229 1.1.1.2 kardel
230 1.1.1.2 kardel Severity: Medium
231 1.1.1.2 kardel
232 1.1.1.2 kardel This is a recommended upgrade.
233 1.1.1.2 kardel
234 1.1.1.2 kardel This release includes build infrastructure updates, code
235 1.1.1.2 kardel clean-ups, minor bug fixes, fixes for a number of minor
236 1.1.1.2 kardel ref-clock issues, and documentation revisions.
237 1.1.1.2 kardel
238 1.1.1.2 kardel Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t.
239 1.1.1.2 kardel
240 1.1.1.2 kardel New features / changes in this release:
241 1.1.1.2 kardel
242 1.1.1.2 kardel Build system
243 1.1.1.2 kardel
244 1.1.1.2 kardel * Fix checking for struct rtattr
245 1.1.1.2 kardel * Update config.guess and config.sub for AIX
246 1.1.1.2 kardel * Upgrade required version of autogen and libopts for building
247 1.1.1.2 kardel from our source code repository
248 1.1.1.2 kardel
249 1.1.1.2 kardel ntpd
250 1.1.1.2 kardel
251 1.1.1.2 kardel * Back-ported several fixes for Coverity warnings from ntp-dev
252 1.1.1.2 kardel * Fix a rare boundary condition in UNLINK_EXPR_SLIST()
253 1.1.1.2 kardel * Allow "logconfig =allall" configuration directive
254 1.1.1.2 kardel * Bind tentative IPv6 addresses on Linux
255 1.1.1.2 kardel * Correct WWVB/Spectracom driver to timestamp CR instead of LF
256 1.1.1.2 kardel * Improved tally bit handling to prevent incorrect ntpq peer status reports
257 1.1.1.2 kardel * Exclude the Undisciplined Local Clock and ACTS drivers from the initial
258 1.1.1.2 kardel candidate list unless they are designated a "prefer peer"
259 1.1.1.2 kardel * Prevent the consideration of Undisciplined Local Clock or ACTS drivers for
260 1.1.1.2 kardel selection during the 'tos orphanwait' period
261 1.1.1.2 kardel * Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS
262 1.1.1.2 kardel drivers
263 1.1.1.2 kardel * Improved support of the Parse Refclock trusttime flag in Meinberg mode
264 1.1.1.2 kardel * Back-port utility routines from ntp-dev: mprintf(), emalloc_zero()
265 1.1.1.2 kardel * Added the NTPD_TICKADJ_PPM environment variable for specifying baseline
266 1.1.1.2 kardel clock slew on Microsoft Windows
267 1.1.1.2 kardel * Code cleanup in libntpq
268 1.1.1.2 kardel
269 1.1.1.2 kardel ntpdc
270 1.1.1.2 kardel
271 1.1.1.2 kardel * Fix timerstats reporting
272 1.1.1.2 kardel
273 1.1.1.2 kardel ntpdate
274 1.1.1.2 kardel
275 1.1.1.2 kardel * Reduce time required to set clock
276 1.1.1.2 kardel * Allow a timeout greater than 2 seconds
277 1.1.1.2 kardel
278 1.1.1.2 kardel sntp
279 1.1.1.2 kardel
280 1.1.1.2 kardel * Backward incompatible command-line option change:
281 1.1.1.2 kardel -l/--filelog changed -l/--logfile (to be consistent with ntpd)
282 1.1.1.2 kardel
283 1.1.1.2 kardel Documentation
284 1.1.1.2 kardel
285 1.1.1.2 kardel * Update html2man. Fix some tags in the .html files
286 1.1.1.2 kardel * Distribute ntp-wait.html
287 1.1.1.2 kardel
288 1.1.1.2 kardel ---
289 1.1.1.2 kardel NTP 4.2.6p3 (Harlan Stenn <stenn (a] ntp.org>, 2011/01/03)
290 1.1.1.2 kardel
291 1.1.1.2 kardel Focus: Bug fixes and portability improvements
292 1.1.1.2 kardel
293 1.1.1.2 kardel Severity: Medium
294 1.1.1.2 kardel
295 1.1.1.2 kardel This is a recommended upgrade.
296 1.1.1.2 kardel
297 1.1.1.2 kardel This release includes build infrastructure updates, code
298 1.1.1.2 kardel clean-ups, minor bug fixes, fixes for a number of minor
299 1.1.1.2 kardel ref-clock issues, and documentation revisions.
300 1.1.1.2 kardel
301 1.1.1.2 kardel Portability improvements in this release affect AIX, Atari FreeMiNT,
302 1.1.1.2 kardel FreeBSD4, Linux and Microsoft Windows.
303 1.1.1.2 kardel
304 1.1.1.2 kardel New features / changes in this release:
305 1.1.1.2 kardel
306 1.1.1.2 kardel Build system
307 1.1.1.2 kardel * Use lsb_release to get information about Linux distributions.
308 1.1.1.2 kardel * 'test' is in /usr/bin (instead of /bin) on some systems.
309 1.1.1.2 kardel * Basic sanity checks for the ChangeLog file.
310 1.1.1.2 kardel * Source certain build files with ./filename for systems without . in PATH.
311 1.1.1.2 kardel * IRIX portability fix.
312 1.1.1.2 kardel * Use a single copy of the "libopts" code.
313 1.1.1.2 kardel * autogen/libopts upgrade.
314 1.1.1.2 kardel * configure.ac m4 quoting cleanup.
315 1.1.1.2 kardel
316 1.1.1.2 kardel ntpd
317 1.1.1.2 kardel * Do not bind to IN6_IFF_ANYCAST addresses.
318 1.1.1.2 kardel * Log the reason for exiting under Windows.
319 1.1.1.2 kardel * Multicast fixes for Windows.
320 1.1.1.2 kardel * Interpolation fixes for Windows.
321 1.1.1.2 kardel * IPv4 and IPv6 Multicast fixes.
322 1.1.1.2 kardel * Manycast solicitation fixes and general repairs.
323 1.1.1.2 kardel * JJY refclock cleanup.
324 1.1.1.2 kardel * NMEA refclock improvements.
325 1.1.1.2 kardel * Oncore debug message cleanup.
326 1.1.1.2 kardel * Palisade refclock now builds under Linux.
327 1.1.1.2 kardel * Give RAWDCF more baud rates.
328 1.1.1.2 kardel * Support Truetime Satellite clocks under Windows.
329 1.1.1.2 kardel * Support Arbiter 1093C Satellite clocks under Windows.
330 1.1.1.2 kardel * Make sure that the "filegen" configuration command defaults to "enable".
331 1.1.1.2 kardel * Range-check the status codes (plus other cleanup) in the RIPE-NCC driver.
332 1.1.1.2 kardel * Prohibit 'includefile' directive in remote configuration command.
333 1.1.1.2 kardel * Fix 'nic' interface bindings.
334 1.1.1.2 kardel * Fix the way we link with openssl if openssl is installed in the base
335 1.1.1.2 kardel system.
336 1.1.1.2 kardel
337 1.1.1.2 kardel ntp-keygen
338 1.1.1.2 kardel * Fix -V coredump.
339 1.1.1.2 kardel * OpenSSL version display cleanup.
340 1.1.1.2 kardel
341 1.1.1.2 kardel ntpdc
342 1.1.1.2 kardel * Many counters should be treated as unsigned.
343 1.1.1.2 kardel
344 1.1.1.2 kardel ntpdate
345 1.1.1.2 kardel * Do not ignore replies with equal receive and transmit timestamps.
346 1.1.1.2 kardel
347 1.1.1.2 kardel ntpq
348 1.1.1.2 kardel * libntpq warning cleanup.
349 1.1.1.2 kardel
350 1.1.1.2 kardel ntpsnmpd
351 1.1.1.2 kardel * Correct SNMP type for "precision" and "resolution".
352 1.1.1.2 kardel * Update the MIB from the draft version to RFC-5907.
353 1.1.1.2 kardel
354 1.1.1.2 kardel sntp
355 1.1.1.2 kardel * Display timezone offset when showing time for sntp in the local
356 1.1.1.2 kardel timezone.
357 1.1.1.2 kardel * Pay proper attention to RATE KoD packets.
358 1.1.1.2 kardel * Fix a miscalculation of the offset.
359 1.1.1.2 kardel * Properly parse empty lines in the key file.
360 1.1.1.2 kardel * Logging cleanup.
361 1.1.1.2 kardel * Use tv_usec correctly in set_time().
362 1.1.1.2 kardel * Documentation cleanup.
363 1.1.1.2 kardel
364 1.1.1.2 kardel ---
365 1.1.1.2 kardel NTP 4.2.6p2 (Harlan Stenn <stenn (a] ntp.org>, 2010/07/08)
366 1.1.1.2 kardel
367 1.1.1.2 kardel Focus: Bug fixes and portability improvements
368 1.1.1.2 kardel
369 1.1.1.2 kardel Severity: Medium
370 1.1.1.2 kardel
371 1.1.1.2 kardel This is a recommended upgrade.
372 1.1.1.2 kardel
373 1.1.1.2 kardel This release includes build infrastructure updates, code
374 1.1.1.2 kardel clean-ups, minor bug fixes, fixes for a number of minor
375 1.1.1.2 kardel ref-clock issues, improved KOD handling, OpenSSL related
376 1.1.1.2 kardel updates and documentation revisions.
377 1.1.1.2 kardel
378 1.1.1.2 kardel Portability improvements in this release affect Irix, Linux,
379 1.1.1.2 kardel Mac OS, Microsoft Windows, OpenBSD and QNX6
380 1.1.1.2 kardel
381 1.1.1.2 kardel New features / changes in this release:
382 1.1.1.2 kardel
383 1.1.1.2 kardel ntpd
384 1.1.1.2 kardel * Range syntax for the trustedkey configuration directive
385 1.1.1.2 kardel * Unified IPv4 and IPv6 restrict lists
386 1.1.1.2 kardel
387 1.1.1.2 kardel ntpdate
388 1.1.1.2 kardel * Rate limiting and KOD handling
389 1.1.1.2 kardel
390 1.1.1.2 kardel ntpsnmpd
391 1.1.1.2 kardel * default connection to net-snmpd via a unix-domain socket
392 1.1.1.2 kardel * command-line 'socket name' option
393 1.1.1.2 kardel
394 1.1.1.2 kardel ntpq / ntpdc
395 1.1.1.2 kardel * support for the "passwd ..." syntax
396 1.1.1.2 kardel * key-type specific password prompts
397 1.1.1.2 kardel
398 1.1.1.2 kardel sntp
399 1.1.1.2 kardel * MD5 authentication of an ntpd
400 1.1.1.2 kardel * Broadcast and crypto
401 1.1.1.2 kardel * OpenSSL support
402 1.1.1.2 kardel
403 1.1.1.2 kardel ---
404 1.1.1.2 kardel NTP 4.2.6p1 (Harlan Stenn <stenn (a] ntp.org>, 2010/04/09)
405 1.1.1.2 kardel
406 1.1.1.2 kardel Focus: Bug fixes, portability fixes, and documentation improvements
407 1.1.1.2 kardel
408 1.1.1.2 kardel Severity: Medium
409 1.1.1.2 kardel
410 1.1.1.2 kardel This is a recommended upgrade.
411 1.1.1.2 kardel
412 1.1.1.2 kardel ---
413 1.1.1.2 kardel NTP 4.2.6 (Harlan Stenn <stenn (a] ntp.org>, 2009/12/08)
414 1.1.1.2 kardel
415 1.1.1.2 kardel Focus: enhancements and bug fixes.
416 1.1.1.2 kardel
417 1.1.1.2 kardel ---
418 1.1 kardel NTP 4.2.4p8 (Harlan Stenn <stenn (a] ntp.org>, 2009/12/08)
419 1.1 kardel
420 1.1 kardel Focus: Security Fixes
421 1.1 kardel
422 1.1 kardel Severity: HIGH
423 1.1 kardel
424 1.1 kardel This release fixes the following high-severity vulnerability:
425 1.1 kardel
426 1.1 kardel * [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
427 1.1 kardel
428 1.1 kardel See http://support.ntp.org/security for more information.
429 1.1 kardel
430 1.1 kardel NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
431 1.1 kardel In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
432 1.1 kardel transfers use modes 1 through 5. Upon receipt of an incorrect mode 7
433 1.1 kardel request or a mode 7 error response from an address which is not listed
434 1.1 kardel in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
435 1.1 kardel reply with a mode 7 error response (and log a message). In this case:
436 1.1 kardel
437 1.1 kardel * If an attacker spoofs the source address of ntpd host A in a
438 1.1 kardel mode 7 response packet sent to ntpd host B, both A and B will
439 1.1 kardel continuously send each other error responses, for as long as
440 1.1 kardel those packets get through.
441 1.1 kardel
442 1.1 kardel * If an attacker spoofs an address of ntpd host A in a mode 7
443 1.1 kardel response packet sent to ntpd host A, A will respond to itself
444 1.1 kardel endlessly, consuming CPU and logging excessively.
445 1.1 kardel
446 1.1 kardel Credit for finding this vulnerability goes to Robin Park and Dmitri
447 1.1 kardel Vinokurov of Alcatel-Lucent.
448 1.1 kardel
449 1.1 kardel THIS IS A STRONGLY RECOMMENDED UPGRADE.
450 1.1 kardel
451 1.1 kardel ---
452 1.1 kardel ntpd now syncs to refclocks right away.
453 1.1 kardel
454 1.1.1.2 kardel Backward-Incompatible changes:
455 1.1 kardel
456 1.1 kardel ntpd no longer accepts '-v name' or '-V name' to define internal variables.
457 1.1 kardel Use '--var name' or '--dvar name' instead. (Bug 817)
458 1.1 kardel
459 1.1 kardel ---
460 1.1 kardel NTP 4.2.4p7 (Harlan Stenn <stenn (a] ntp.org>, 2009/05/04)
461 1.1 kardel
462 1.1 kardel Focus: Security and Bug Fixes
463 1.1 kardel
464 1.1 kardel Severity: HIGH
465 1.1 kardel
466 1.1 kardel This release fixes the following high-severity vulnerability:
467 1.1 kardel
468 1.1 kardel * [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252
469 1.1 kardel
470 1.1 kardel See http://support.ntp.org/security for more information.
471 1.1 kardel
472 1.1 kardel If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
473 1.1 kardel line) then a carefully crafted packet sent to the machine will cause
474 1.1 kardel a buffer overflow and possible execution of injected code, running
475 1.1 kardel with the privileges of the ntpd process (often root).
476 1.1 kardel
477 1.1 kardel Credit for finding this vulnerability goes to Chris Ries of CMU.
478 1.1 kardel
479 1.1 kardel This release fixes the following low-severity vulnerabilities:
480 1.1 kardel
481 1.1 kardel * [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159
482 1.1 kardel Credit for finding this vulnerability goes to Geoff Keating of Apple.
483 1.1 kardel
484 1.1 kardel * [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
485 1.1 kardel Credit for finding this issue goes to Dave Hart.
486 1.1 kardel
487 1.1 kardel This release fixes a number of bugs and adds some improvements:
488 1.1 kardel
489 1.1 kardel * Improved logging
490 1.1 kardel * Fix many compiler warnings
491 1.1 kardel * Many fixes and improvements for Windows
492 1.1 kardel * Adds support for AIX 6.1
493 1.1 kardel * Resolves some issues under MacOS X and Solaris
494 1.1 kardel
495 1.1 kardel THIS IS A STRONGLY RECOMMENDED UPGRADE.
496 1.1 kardel
497 1.1 kardel ---
498 1.1 kardel NTP 4.2.4p6 (Harlan Stenn <stenn (a] ntp.org>, 2009/01/07)
499 1.1 kardel
500 1.1 kardel Focus: Security Fix
501 1.1 kardel
502 1.1 kardel Severity: Low
503 1.1 kardel
504 1.1 kardel This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
505 1.1 kardel the OpenSSL library relating to the incorrect checking of the return
506 1.1 kardel value of EVP_VerifyFinal function.
507 1.1 kardel
508 1.1 kardel Credit for finding this issue goes to the Google Security Team for
509 1.1 kardel finding the original issue with OpenSSL, and to ocert.org for finding
510 1.1 kardel the problem in NTP and telling us about it.
511 1.1 kardel
512 1.1 kardel This is a recommended upgrade.
513 1.1 kardel ---
514 1.1 kardel NTP 4.2.4p5 (Harlan Stenn <stenn (a] ntp.org>, 2008/08/17)
515 1.1 kardel
516 1.1 kardel Focus: Minor Bugfixes
517 1.1 kardel
518 1.1 kardel This release fixes a number of Windows-specific ntpd bugs and
519 1.1 kardel platform-independent ntpdate bugs. A logging bugfix has been applied
520 1.1 kardel to the ONCORE driver.
521 1.1 kardel
522 1.1 kardel The "dynamic" keyword and is now obsolete and deferred binding to local
523 1.1 kardel interfaces is the new default. The minimum time restriction for the
524 1.1 kardel interface update interval has been dropped.
525 1.1 kardel
526 1.1 kardel A number of minor build system and documentation fixes are included.
527 1.1 kardel
528 1.1 kardel This is a recommended upgrade for Windows.
529 1.1 kardel
530 1.1 kardel ---
531 1.1 kardel NTP 4.2.4p4 (Harlan Stenn <stenn (a] ntp.org>, 2007/09/10)
532 1.1 kardel
533 1.1 kardel Focus: Minor Bugfixes
534 1.1 kardel
535 1.1 kardel This release updates certain copyright information, fixes several display
536 1.1 kardel bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
537 1.1 kardel shutdown in the parse refclock driver, removes some lint from the code,
538 1.1 kardel stops accessing certain buffers immediately after they were freed, fixes
539 1.1 kardel a problem with non-command-line specification of -6, and allows the loopback
540 1.1 kardel interface to share addresses with other interfaces.
541 1.1 kardel
542 1.1 kardel ---
543 1.1 kardel NTP 4.2.4p3 (Harlan Stenn <stenn (a] ntp.org>, 2007/06/29)
544 1.1 kardel
545 1.1 kardel Focus: Minor Bugfixes
546 1.1 kardel
547 1.1 kardel This release fixes a bug in Windows that made it difficult to
548 1.1 kardel terminate ntpd under windows.
549 1.1 kardel This is a recommended upgrade for Windows.
550 1.1 kardel
551 1.1 kardel ---
552 1.1 kardel NTP 4.2.4p2 (Harlan Stenn <stenn (a] ntp.org>, 2007/06/19)
553 1.1 kardel
554 1.1 kardel Focus: Minor Bugfixes
555 1.1 kardel
556 1.1 kardel This release fixes a multicast mode authentication problem,
557 1.1 kardel an error in NTP packet handling on Windows that could lead to
558 1.1 kardel ntpd crashing, and several other minor bugs. Handling of
559 1.1 kardel multicast interfaces and logging configuration were improved.
560 1.1 kardel The required versions of autogen and libopts were incremented.
561 1.1 kardel This is a recommended upgrade for Windows and multicast users.
562 1.1 kardel
563 1.1 kardel ---
564 1.1 kardel NTP 4.2.4 (Harlan Stenn <stenn (a] ntp.org>, 2006/12/31)
565 1.1 kardel
566 1.1 kardel Focus: enhancements and bug fixes.
567 1.1 kardel
568 1.1 kardel Dynamic interface rescanning was added to simplify the use of ntpd in
569 1.1 kardel conjunction with DHCP. GNU AutoGen is used for its command-line options
570 1.1 kardel processing. Separate PPS devices are supported for PARSE refclocks, MD5
571 1.1 kardel signatures are now provided for the release files. Drivers have been
572 1.1 kardel added for some new ref-clocks and have been removed for some older
573 1.1 kardel ref-clocks. This release also includes other improvements, documentation
574 1.1 kardel and bug fixes.
575 1.1 kardel
576 1.1 kardel K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
577 1.1 kardel C support.
578 1.1 kardel
579 1.1 kardel ---
580 1.1 kardel NTP 4.2.0 (Harlan Stenn <stenn (a] ntp.org>, 2003/10/15)
581 1.1 kardel
582 1.1 kardel Focus: enhancements and bug fixes.
583