Home | History | Annotate | Line # | Download | only in dist
NEWS revision 1.1.1.3.4.1
      1 ---
      2 NTP 4.2.8 (Harlan Stenn <stenn (a] ntp.org>, 2014/12/18) 
      3  
      4 Focus: Security and Bug fixes, enhancements.
      5  
      6 Severity: HIGH
      7  
      8 In addition to bug fixes and enhancements, this release fixes the
      9 following high-severity vulnerabilities:
     10 
     11 * Weak default key in config_auth().
     12 
     13   References: [Sec 2665] / CVE-2014-9293 / VU#852879
     14   CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
     15   Vulnerable Versions: all releases prior to 4.2.7p11
     16   Date Resolved: 28 Jan 2010
     17 
     18   Summary: If no 'auth' key is set in the configuration file, ntpd
     19 	would generate a random key on the fly.  There were two
     20 	problems with this: 1) the generated key was 31 bits in size,
     21 	and 2) it used the (now weak) ntp_random() function, which was
     22 	seeded with a 32-bit value and could only provide 32 bits of
     23 	entropy.  This was sufficient back in the late 1990s when the
     24 	code was written.  Not today.
     25 
     26   Mitigation: Upgrade to 4.2.7p11 or later.
     27 
     28   Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
     29   	of the Google Security Team.
     30 
     31 * Non-cryptographic random number generator with weak seed used by
     32   ntp-keygen to generate symmetric keys.
     33 
     34   References: [Sec 2666] / CVE-2014-9294 / VU#852879
     35   CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
     36   Vulnerable Versions: All NTP4 releases before 4.2.7p230
     37   Date Resolved: Dev (4.2.7p230) 01 Nov 2011
     38 
     39   Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
     40   	prepare a random number generator that was of good quality back
     41 	in the late 1990s. The random numbers produced was then used to
     42 	generate symmetric keys. In ntp-4.2.8 we use a current-technology
     43 	cryptographic random number generator, either RAND_bytes from
     44 	OpenSSL, or arc4random(). 
     45 
     46   Mitigation: Upgrade to 4.2.7p230 or later.
     47 
     48   Credit:  This vulnerability was discovered in ntp-4.2.6 by
     49   	Stephen Roettger of the Google Security Team.
     50 
     51 * Buffer overflow in crypto_recv()
     52 
     53   References: Sec 2667 / CVE-2014-9295 / VU#852879
     54   CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
     55   Versions: All releases before 4.2.8
     56   Date Resolved: Stable (4.2.8) 18 Dec 2014
     57 
     58   Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
     59   	file contains a 'crypto pw ...' directive) a remote attacker
     60 	can send a carefully crafted packet that can overflow a stack
     61 	buffer and potentially allow malicious code to be executed
     62 	with the privilege level of the ntpd process.
     63 
     64   Mitigation: Upgrade to 4.2.8, or later, or
     65 	Disable Autokey Authentication by removing, or commenting out,
     66 	all configuration directives beginning with the crypto keyword
     67 	in your ntp.conf file. 
     68 
     69   Credit: This vulnerability was discovered by Stephen Roettger of the
     70   	Google Security Team. 
     71 
     72 * Buffer overflow in ctl_putdata()
     73 
     74   References: Sec 2668 / CVE-2014-9295 / VU#852879
     75   CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
     76   Versions: All NTP4 releases before 4.2.8
     77   Date Resolved: Stable (4.2.8) 18 Dec 2014
     78 
     79   Summary: A remote attacker can send a carefully crafted packet that
     80   	can overflow a stack buffer and potentially allow malicious
     81 	code to be executed with the privilege level of the ntpd process.
     82 
     83   Mitigation: Upgrade to 4.2.8, or later.
     84 
     85   Credit: This vulnerability was discovered by Stephen Roettger of the
     86   	Google Security Team. 
     87 
     88 * Buffer overflow in configure()
     89 
     90   References: Sec 2669 / CVE-2014-9295 / VU#852879
     91   CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
     92   Versions: All NTP4 releases before 4.2.8
     93   Date Resolved: Stable (4.2.8) 18 Dec 2014
     94 
     95   Summary: A remote attacker can send a carefully crafted packet that
     96 	can overflow a stack buffer and potentially allow malicious
     97 	code to be executed with the privilege level of the ntpd process.
     98 
     99   Mitigation: Upgrade to 4.2.8, or later.
    100 
    101   Credit: This vulnerability was discovered by Stephen Roettger of the
    102 	Google Security Team. 
    103 
    104 * receive(): missing return on error
    105 
    106   References: Sec 2670 / CVE-2014-9296 / VU#852879
    107   CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
    108   Versions: All NTP4 releases before 4.2.8
    109   Date Resolved: Stable (4.2.8) 18 Dec 2014
    110 
    111   Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
    112   	the code path where an error was detected, which meant
    113 	processing did not stop when a specific rare error occurred.
    114 	We haven't found a way for this bug to affect system integrity.
    115 	If there is no way to affect system integrity the base CVSS
    116 	score for this bug is 0. If there is one avenue through which
    117 	system integrity can be partially affected, the base score
    118 	becomes a 5. If system integrity can be partially affected
    119 	via all three integrity metrics, the CVSS base score become 7.5.
    120 
    121   Mitigation:
    122         Upgrade to 4.2.8, or later,
    123         or Remove or comment out all configuration directives
    124 	beginning with the crypto keyword in your ntp.conf file. 
    125 
    126   Credit: This vulnerability was discovered by Stephen Roettger of the
    127   	Google Security Team. 
    128 
    129 See http://support.ntp.org/security for more information.
    130 
    131 New features / changes in this release:
    132 
    133 Important Changes
    134 
    135 * Internal NTP Era counters
    136 
    137 The internal counters that track the "era" (range of years) we are in
    138 rolls over every 136 years'.  The current "era" started at the stroke of
    139 midnight on 1 Jan 1900, and ends just before the stroke of midnight on
    140 1 Jan 2036.
    141 In the past, we have used the "midpoint" of the  range to decide which
    142 era we were in.  Given the longevity of some products, it became clear
    143 that it would be more functional to "look back" less, and "look forward"
    144 more.  We now compile a timestamp into the ntpd executable and when we
    145 get a timestamp we us the "built-on" to tell us what era we are in.
    146 This check "looks back" 10 years, and "looks forward" 126 years.
    147 
    148 * ntpdc responses disabled by default
    149 
    150 Dave Hart writes:
    151 
    152 For a long time, ntpq and its mostly text-based mode 6 (control) 
    153 protocol have been preferred over ntpdc and its mode 7 (private 
    154 request) protocol for runtime queries and configuration.  There has 
    155 been a goal of deprecating ntpdc, previously held back by numerous 
    156 capabilities exposed by ntpdc with no ntpq equivalent.  I have been 
    157 adding commands to ntpq to cover these cases, and I believe I've 
    158 covered them all, though I've not compared command-by-command 
    159 recently. 
    160 
    161 As I've said previously, the binary mode 7 protocol involves a lot of 
    162 hand-rolled structure layout and byte-swapping code in both ntpd and 
    163 ntpdc which is hard to get right.  As ntpd grows and changes, the 
    164 changes are difficult to expose via ntpdc while maintaining forward 
    165 and backward compatibility between ntpdc and ntpd.  In contrast, 
    166 ntpq's text-based, label=value approach involves more code reuse and 
    167 allows compatible changes without extra work in most cases. 
    168 
    169 Mode 7 has always been defined as vendor/implementation-specific while 
    170 mode 6 is described in RFC 1305 and intended to be open to interoperate 
    171 with other implementations.  There is an early draft of an updated 
    172 mode 6 description that likely will join the other NTPv4 RFCs 
    173 eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01)
    174 
    175 For these reasons, ntpd 4.2.7p230 by default disables processing of 
    176 ntpdc queries, reducing ntpd's attack surface and functionally 
    177 deprecating ntpdc.  If you are in the habit of using ntpdc for certain 
    178 operations, please try the ntpq equivalent.  If there's no equivalent, 
    179 please open a bug report at http://bugs.ntp.org./
    180 
    181 In addition to the above, over 1100 issues have been resolved between
    182 the 4.2.6 branch and 4.2.8.  The ChangeLog file in the distribution
    183 lists these.
    184 
    185 --- 
    186 NTP 4.2.6p5 (Harlan Stenn <stenn (a] ntp.org>, 2011/12/24) 
    187  
    188 Focus: Bug fixes
    189  
    190 Severity: Medium 
    191  
    192 This is a recommended upgrade. 
    193 
    194 This release updates sys_rootdisp and sys_jitter calculations to match the
    195 RFC specification, fixes a potential IPv6 address matching error for the
    196 "nic" and "interface" configuration directives, suppresses the creation of
    197 extraneous ephemeral associations for certain broadcastclient and
    198 multicastclient configurations, cleans up some ntpq display issues, and
    199 includes improvements to orphan mode, minor bugs fixes and code clean-ups.
    200 
    201 New features / changes in this release:
    202 
    203 ntpd
    204 
    205  * Updated "nic" and "interface" IPv6 address handling to prevent 
    206    mismatches with localhost [::1] and wildcard [::] which resulted from
    207    using the address/prefix format (e.g. fe80::/64)
    208  * Fix orphan mode stratum incorrectly counting to infinity
    209  * Orphan parent selection metric updated to includes missing ntohl()
    210  * Non-printable stratum 16 refid no longer sent to ntp
    211  * Duplicate ephemeral associations suppressed for broadcastclient and
    212    multicastclient without broadcastdelay
    213  * Exclude undetermined sys_refid from use in loopback TEST12
    214  * Exclude MODE_SERVER responses from KoD rate limiting
    215  * Include root delay in clock_update() sys_rootdisp calculations
    216  * get_systime() updated to exclude sys_residual offset (which only
    217    affected bits "below" sys_tick, the precision threshold)
    218  * sys.peer jitter weighting corrected in sys_jitter calculation
    219 
    220 ntpq
    221 
    222  * -n option extended to include the billboard "server" column
    223  * IPv6 addresses in the local column truncated to prevent overruns
    224 
    225 --- 
    226 NTP 4.2.6p4 (Harlan Stenn <stenn (a] ntp.org>, 2011/09/22) 
    227  
    228 Focus: Bug fixes and portability improvements 
    229  
    230 Severity: Medium 
    231  
    232 This is a recommended upgrade. 
    233  
    234 This release includes build infrastructure updates, code 
    235 clean-ups, minor bug fixes, fixes for a number of minor 
    236 ref-clock issues, and documentation revisions. 
    237  
    238 Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 
    239  
    240 New features / changes in this release: 
    241  
    242 Build system 
    243  
    244 * Fix checking for struct rtattr 
    245 * Update config.guess and config.sub for AIX 
    246 * Upgrade required version of autogen and libopts for building 
    247   from our source code repository 
    248  
    249 ntpd 
    250  
    251 * Back-ported several fixes for Coverity warnings from ntp-dev 
    252 * Fix a rare boundary condition in UNLINK_EXPR_SLIST() 
    253 * Allow "logconfig =allall" configuration directive 
    254 * Bind tentative IPv6 addresses on Linux 
    255 * Correct WWVB/Spectracom driver to timestamp CR instead of LF 
    256 * Improved tally bit handling to prevent incorrect ntpq peer status reports 
    257 * Exclude the Undisciplined Local Clock and ACTS drivers from the initial 
    258   candidate list unless they are designated a "prefer peer" 
    259 * Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 
    260   selection during the 'tos orphanwait' period 
    261 * Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 
    262   drivers 
    263 * Improved support of the Parse Refclock trusttime flag in Meinberg mode 
    264 * Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 
    265 * Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 
    266   clock slew on Microsoft Windows 
    267 * Code cleanup in libntpq 
    268  
    269 ntpdc 
    270  
    271 * Fix timerstats reporting 
    272  
    273 ntpdate 
    274  
    275 * Reduce time required to set clock 
    276 * Allow a timeout greater than 2 seconds 
    277  
    278 sntp 
    279  
    280 * Backward incompatible command-line option change: 
    281   -l/--filelog changed -l/--logfile (to be consistent with ntpd) 
    282  
    283 Documentation 
    284  
    285 * Update html2man. Fix some tags in the .html files 
    286 * Distribute ntp-wait.html 
    287 
    288 ---
    289 NTP 4.2.6p3 (Harlan Stenn <stenn (a] ntp.org>, 2011/01/03)
    290 
    291 Focus: Bug fixes and portability improvements
    292 
    293 Severity: Medium
    294 
    295 This is a recommended upgrade.
    296 
    297 This release includes build infrastructure updates, code
    298 clean-ups, minor bug fixes, fixes for a number of minor
    299 ref-clock issues, and documentation revisions.
    300 
    301 Portability improvements in this release affect AIX, Atari FreeMiNT,
    302 FreeBSD4, Linux and Microsoft Windows.
    303 
    304 New features / changes in this release:
    305 
    306 Build system
    307 * Use lsb_release to get information about Linux distributions.
    308 * 'test' is in /usr/bin (instead of /bin) on some systems.
    309 * Basic sanity checks for the ChangeLog file.
    310 * Source certain build files with ./filename for systems without . in PATH.
    311 * IRIX portability fix.
    312 * Use a single copy of the "libopts" code.
    313 * autogen/libopts upgrade.
    314 * configure.ac m4 quoting cleanup.
    315 
    316 ntpd
    317 * Do not bind to IN6_IFF_ANYCAST addresses.
    318 * Log the reason for exiting under Windows.
    319 * Multicast fixes for Windows.
    320 * Interpolation fixes for Windows.
    321 * IPv4 and IPv6 Multicast fixes.
    322 * Manycast solicitation fixes and general repairs.
    323 * JJY refclock cleanup.
    324 * NMEA refclock improvements.
    325 * Oncore debug message cleanup.
    326 * Palisade refclock now builds under Linux.
    327 * Give RAWDCF more baud rates.
    328 * Support Truetime Satellite clocks under Windows.
    329 * Support Arbiter 1093C Satellite clocks under Windows.
    330 * Make sure that the "filegen" configuration command defaults to "enable".
    331 * Range-check the status codes (plus other cleanup) in the RIPE-NCC driver.
    332 * Prohibit 'includefile' directive in remote configuration command.
    333 * Fix 'nic' interface bindings.
    334 * Fix the way we link with openssl if openssl is installed in the base
    335   system.
    336 
    337 ntp-keygen
    338 * Fix -V coredump.
    339 * OpenSSL version display cleanup.
    340 
    341 ntpdc
    342 * Many counters should be treated as unsigned.
    343 
    344 ntpdate
    345 * Do not ignore replies with equal receive and transmit timestamps.
    346 
    347 ntpq
    348 * libntpq warning cleanup.
    349 
    350 ntpsnmpd
    351 * Correct SNMP type for "precision" and "resolution".
    352 * Update the MIB from the draft version to RFC-5907.
    353 
    354 sntp
    355 * Display timezone offset when showing time for sntp in the local
    356   timezone.
    357 * Pay proper attention to RATE KoD packets.
    358 * Fix a miscalculation of the offset.
    359 * Properly parse empty lines in the key file.
    360 * Logging cleanup.
    361 * Use tv_usec correctly in set_time().
    362 * Documentation cleanup.
    363 
    364 ---
    365 NTP 4.2.6p2 (Harlan Stenn <stenn (a] ntp.org>, 2010/07/08)
    366 
    367 Focus: Bug fixes and portability improvements
    368 
    369 Severity: Medium
    370 
    371 This is a recommended upgrade.
    372 
    373 This release includes build infrastructure updates, code
    374 clean-ups, minor bug fixes, fixes for a number of minor
    375 ref-clock issues, improved KOD handling, OpenSSL related
    376 updates and documentation revisions.
    377 
    378 Portability improvements in this release affect Irix, Linux,
    379 Mac OS, Microsoft Windows, OpenBSD and QNX6
    380 
    381 New features / changes in this release:
    382 
    383 ntpd
    384 * Range syntax for the trustedkey configuration directive
    385 * Unified IPv4 and IPv6 restrict lists
    386 
    387 ntpdate
    388 * Rate limiting and KOD handling
    389 
    390 ntpsnmpd
    391 * default connection to net-snmpd via a unix-domain socket
    392 * command-line 'socket name' option
    393 
    394 ntpq / ntpdc
    395 * support for the "passwd ..." syntax
    396 * key-type specific password prompts
    397 
    398 sntp
    399 * MD5 authentication of an ntpd
    400 * Broadcast and crypto
    401 * OpenSSL support
    402 
    403 ---
    404 NTP 4.2.6p1 (Harlan Stenn <stenn (a] ntp.org>, 2010/04/09)
    405 
    406 Focus: Bug fixes, portability fixes, and documentation improvements
    407 
    408 Severity: Medium
    409 
    410 This is a recommended upgrade.
    411 
    412 ---
    413 NTP 4.2.6 (Harlan Stenn <stenn (a] ntp.org>, 2009/12/08)
    414 
    415 Focus: enhancements and bug fixes.
    416 
    417 ---
    418 NTP 4.2.4p8 (Harlan Stenn <stenn (a] ntp.org>, 2009/12/08)
    419 
    420 Focus: Security Fixes
    421 
    422 Severity: HIGH
    423 
    424 This release fixes the following high-severity vulnerability:
    425 
    426 * [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
    427 
    428   See http://support.ntp.org/security for more information.
    429 
    430   NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
    431   In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
    432   transfers use modes 1 through 5.  Upon receipt of an incorrect mode 7
    433   request or a mode 7 error response from an address which is not listed
    434   in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
    435   reply with a mode 7 error response (and log a message).  In this case:
    436 
    437 	* If an attacker spoofs the source address of ntpd host A in a
    438 	  mode 7 response packet sent to ntpd host B, both A and B will
    439 	  continuously send each other error responses, for as long as
    440 	  those packets get through.
    441 
    442 	* If an attacker spoofs an address of ntpd host A in a mode 7
    443 	  response packet sent to ntpd host A, A will respond to itself
    444 	  endlessly, consuming CPU and logging excessively.
    445 
    446   Credit for finding this vulnerability goes to Robin Park and Dmitri
    447   Vinokurov of Alcatel-Lucent.
    448 
    449 THIS IS A STRONGLY RECOMMENDED UPGRADE.
    450 
    451 ---
    452 ntpd now syncs to refclocks right away.
    453 
    454 Backward-Incompatible changes:
    455 
    456 ntpd no longer accepts '-v name' or '-V name' to define internal variables.
    457 Use '--var name' or '--dvar name' instead. (Bug 817)
    458 
    459 ---
    460 NTP 4.2.4p7 (Harlan Stenn <stenn (a] ntp.org>, 2009/05/04)
    461 
    462 Focus: Security and Bug Fixes
    463 
    464 Severity: HIGH
    465 
    466 This release fixes the following high-severity vulnerability:
    467 
    468 * [Sec 1151] Remote exploit if autokey is enabled.  CVE-2009-1252
    469 
    470   See http://support.ntp.org/security for more information.
    471 
    472   If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
    473   line) then a carefully crafted packet sent to the machine will cause
    474   a buffer overflow and possible execution of injected code, running
    475   with the privileges of the ntpd process (often root).
    476 
    477   Credit for finding this vulnerability goes to Chris Ries of CMU.
    478 
    479 This release fixes the following low-severity vulnerabilities:
    480 
    481 * [Sec 1144] limited (two byte) buffer overflow in ntpq.  CVE-2009-0159
    482   Credit for finding this vulnerability goes to Geoff Keating of Apple.
    483   
    484 * [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
    485   Credit for finding this issue goes to Dave Hart.
    486 
    487 This release fixes a number of bugs and adds some improvements:
    488 
    489 * Improved logging
    490 * Fix many compiler warnings
    491 * Many fixes and improvements for Windows
    492 * Adds support for AIX 6.1
    493 * Resolves some issues under MacOS X and Solaris
    494 
    495 THIS IS A STRONGLY RECOMMENDED UPGRADE.
    496 
    497 ---
    498 NTP 4.2.4p6 (Harlan Stenn <stenn (a] ntp.org>, 2009/01/07)
    499 
    500 Focus: Security Fix
    501 
    502 Severity: Low
    503 
    504 This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
    505 the OpenSSL library relating to the incorrect checking of the return
    506 value of EVP_VerifyFinal function.
    507 
    508 Credit for finding this issue goes to the Google Security Team for
    509 finding the original issue with OpenSSL, and to ocert.org for finding
    510 the problem in NTP and telling us about it.
    511 
    512 This is a recommended upgrade.
    513 ---
    514 NTP 4.2.4p5 (Harlan Stenn <stenn (a] ntp.org>, 2008/08/17)
    515 
    516 Focus: Minor Bugfixes 
    517 
    518 This release fixes a number of Windows-specific ntpd bugs and 
    519 platform-independent ntpdate bugs. A logging bugfix has been applied
    520 to the ONCORE driver.
    521 
    522 The "dynamic" keyword and is now obsolete and deferred binding to local 
    523 interfaces is the new default. The minimum time restriction for the 
    524 interface update interval has been dropped. 
    525 
    526 A number of minor build system and documentation fixes are included. 
    527 
    528 This is a recommended upgrade for Windows. 
    529 
    530 ---
    531 NTP 4.2.4p4 (Harlan Stenn <stenn (a] ntp.org>, 2007/09/10)
    532 
    533 Focus: Minor Bugfixes
    534 
    535 This release updates certain copyright information, fixes several display
    536 bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
    537 shutdown in the parse refclock driver, removes some lint from the code,
    538 stops accessing certain buffers immediately after they were freed, fixes
    539 a problem with non-command-line specification of -6, and allows the loopback
    540 interface to share addresses with other interfaces.
    541 
    542 ---
    543 NTP 4.2.4p3 (Harlan Stenn <stenn (a] ntp.org>, 2007/06/29)
    544 
    545 Focus: Minor Bugfixes
    546 
    547 This release fixes a bug in Windows that made it difficult to
    548 terminate ntpd under windows.
    549 This is a recommended upgrade for Windows.
    550 
    551 ---
    552 NTP 4.2.4p2 (Harlan Stenn <stenn (a] ntp.org>, 2007/06/19)
    553 
    554 Focus: Minor Bugfixes
    555 
    556 This release fixes a multicast mode authentication problem, 
    557 an error in NTP packet handling on Windows that could lead to 
    558 ntpd crashing, and several other minor bugs. Handling of 
    559 multicast interfaces and logging configuration were improved. 
    560 The required versions of autogen and libopts were incremented.
    561 This is a recommended upgrade for Windows and multicast users.
    562 
    563 ---
    564 NTP 4.2.4 (Harlan Stenn <stenn (a] ntp.org>, 2006/12/31)
    565 
    566 Focus: enhancements and bug fixes.
    567 
    568 Dynamic interface rescanning was added to simplify the use of ntpd in 
    569 conjunction with DHCP. GNU AutoGen is used for its command-line options 
    570 processing. Separate PPS devices are supported for PARSE refclocks, MD5 
    571 signatures are now provided for the release files. Drivers have been 
    572 added for some new ref-clocks and have been removed for some older 
    573 ref-clocks. This release also includes other improvements, documentation 
    574 and bug fixes. 
    575 
    576 K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 
    577 C support.
    578 
    579 ---
    580 NTP 4.2.0 (Harlan Stenn <stenn (a] ntp.org>, 2003/10/15)
    581 
    582 Focus: enhancements and bug fixes.
    583