xref: /freebsd/contrib/ntp/NEWS (revision 2b15cb3d0922bd70ea592f0da9b4a5b167f4d53f)
1*2b15cb3dSCy Schubert---
2*2b15cb3dSCy SchubertNTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04)
3*2b15cb3dSCy Schubert
4*2b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements.
5*2b15cb3dSCy Schubert
6*2b15cb3dSCy SchubertSeverity: HIGH
7*2b15cb3dSCy Schubert
8*2b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the
9*2b15cb3dSCy Schubertfollowing high-severity vulnerabilities:
10*2b15cb3dSCy Schubert
11*2b15cb3dSCy Schubert* vallen is not validated in several places in ntp_crypto.c, leading
12*2b15cb3dSCy Schubert  to a potential information leak or possibly a crash
13*2b15cb3dSCy Schubert
14*2b15cb3dSCy Schubert    References: Sec 2671 / CVE-2014-9297 / VU#852879
15*2b15cb3dSCy Schubert    Affects: All NTP4 releases before 4.2.8p1 that are running autokey.
16*2b15cb3dSCy Schubert    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
17*2b15cb3dSCy Schubert    Date Resolved: Stable (4.2.8p1) 04 Feb 2015
18*2b15cb3dSCy Schubert    Summary: The vallen packet value is not validated in several code
19*2b15cb3dSCy Schubert             paths in ntp_crypto.c which can lead to information leakage
20*2b15cb3dSCy Schubert	     or perhaps a crash of the ntpd process.
21*2b15cb3dSCy Schubert    Mitigation - any of:
22*2b15cb3dSCy Schubert	Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
23*2b15cb3dSCy Schubert		or the NTP Public Services Project Download Page.
24*2b15cb3dSCy Schubert	Disable Autokey Authentication by removing, or commenting out,
25*2b15cb3dSCy Schubert		all configuration directives beginning with the "crypto"
26*2b15cb3dSCy Schubert		keyword in your ntp.conf file.
27*2b15cb3dSCy Schubert    Credit: This vulnerability was discovered by Stephen Roettger of the
28*2b15cb3dSCy Schubert    	Google Security Team, with additional cases found by Sebastian
29*2b15cb3dSCy Schubert	Krahmer of the SUSE Security Team and Harlan Stenn of Network
30*2b15cb3dSCy Schubert	Time Foundation.
31*2b15cb3dSCy Schubert
32*2b15cb3dSCy Schubert* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses
33*2b15cb3dSCy Schubert  can be bypassed.
34*2b15cb3dSCy Schubert
35*2b15cb3dSCy Schubert    References: Sec 2672 / CVE-2014-9298 / VU#852879
36*2b15cb3dSCy Schubert    Affects: All NTP4 releases before 4.2.8p1, under at least some
37*2b15cb3dSCy Schubert	versions of MacOS and Linux. *BSD has not been seen to be vulnerable.
38*2b15cb3dSCy Schubert    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9
39*2b15cb3dSCy Schubert    Date Resolved: Stable (4.2.8p1) 04 Feb 2014
40*2b15cb3dSCy Schubert    Summary: While available kernels will prevent 127.0.0.1 addresses
41*2b15cb3dSCy Schubert	from "appearing" on non-localhost IPv4 interfaces, some kernels
42*2b15cb3dSCy Schubert	do not offer the same protection for ::1 source addresses on
43*2b15cb3dSCy Schubert	IPv6 interfaces. Since NTP's access control is based on source
44*2b15cb3dSCy Schubert	address and localhost addresses generally have no restrictions,
45*2b15cb3dSCy Schubert	an attacker can send malicious control and configuration packets
46*2b15cb3dSCy Schubert	by spoofing ::1 addresses from the outside. Note Well: This is
47*2b15cb3dSCy Schubert	not really a bug in NTP, it's a problem with some OSes. If you
48*2b15cb3dSCy Schubert	have one of these OSes where ::1 can be spoofed, ALL ::1 -based
49*2b15cb3dSCy Schubert	ACL restrictions on any application can be bypassed!
50*2b15cb3dSCy Schubert    Mitigation:
51*2b15cb3dSCy Schubert        Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
52*2b15cb3dSCy Schubert	or the NTP Public Services Project Download Page
53*2b15cb3dSCy Schubert        Install firewall rules to block packets claiming to come from
54*2b15cb3dSCy Schubert	::1 from inappropriate network interfaces.
55*2b15cb3dSCy Schubert    Credit: This vulnerability was discovered by Stephen Roettger of
56*2b15cb3dSCy Schubert	the Google Security Team.
57*2b15cb3dSCy Schubert
58*2b15cb3dSCy SchubertAdditionally, over 30 bugfixes and improvements were made to the codebase.
59*2b15cb3dSCy SchubertSee the ChangeLog for more information.
60*2b15cb3dSCy Schubert
61*2b15cb3dSCy Schubert---
62*2b15cb3dSCy SchubertNTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
63*2b15cb3dSCy Schubert
64*2b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements.
65*2b15cb3dSCy Schubert
66*2b15cb3dSCy SchubertSeverity: HIGH
67*2b15cb3dSCy Schubert
68*2b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the
69*2b15cb3dSCy Schubertfollowing high-severity vulnerabilities:
70*2b15cb3dSCy Schubert
71*2b15cb3dSCy Schubert************************** vv NOTE WELL vv *****************************
72*2b15cb3dSCy Schubert
73*2b15cb3dSCy SchubertThe vulnerabilities listed below can be significantly mitigated by
74*2b15cb3dSCy Schubertfollowing the BCP of putting
75*2b15cb3dSCy Schubert
76*2b15cb3dSCy Schubert restrict default ... noquery
77*2b15cb3dSCy Schubert
78*2b15cb3dSCy Schubertin the ntp.conf file.  With the exception of:
79*2b15cb3dSCy Schubert
80*2b15cb3dSCy Schubert   receive(): missing return on error
81*2b15cb3dSCy Schubert   References: Sec 2670 / CVE-2014-9296 / VU#852879
82*2b15cb3dSCy Schubert
83*2b15cb3dSCy Schubertbelow (which is a limited-risk vulnerability), none of the recent
84*2b15cb3dSCy Schubertvulnerabilities listed below can be exploited if the source IP is
85*2b15cb3dSCy Schubertrestricted from sending a 'query'-class packet by your ntp.conf file.
86*2b15cb3dSCy Schubert
87*2b15cb3dSCy Schubert************************** ^^ NOTE WELL ^^ *****************************
88*2b15cb3dSCy Schubert
89*2b15cb3dSCy Schubert* Weak default key in config_auth().
90*2b15cb3dSCy Schubert
91*2b15cb3dSCy Schubert  References: [Sec 2665] / CVE-2014-9293 / VU#852879
92*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
93*2b15cb3dSCy Schubert  Vulnerable Versions: all releases prior to 4.2.7p11
94*2b15cb3dSCy Schubert  Date Resolved: 28 Jan 2010
95*2b15cb3dSCy Schubert
96*2b15cb3dSCy Schubert  Summary: If no 'auth' key is set in the configuration file, ntpd
97*2b15cb3dSCy Schubert	would generate a random key on the fly.  There were two
98*2b15cb3dSCy Schubert	problems with this: 1) the generated key was 31 bits in size,
99*2b15cb3dSCy Schubert	and 2) it used the (now weak) ntp_random() function, which was
100*2b15cb3dSCy Schubert	seeded with a 32-bit value and could only provide 32 bits of
101*2b15cb3dSCy Schubert	entropy.  This was sufficient back in the late 1990s when the
102*2b15cb3dSCy Schubert	code was written.  Not today.
103*2b15cb3dSCy Schubert
104*2b15cb3dSCy Schubert  Mitigation - any of:
105*2b15cb3dSCy Schubert	- Upgrade to 4.2.7p11 or later.
106*2b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
107*2b15cb3dSCy Schubert
108*2b15cb3dSCy Schubert  Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
109*2b15cb3dSCy Schubert  	of the Google Security Team.
110*2b15cb3dSCy Schubert
111*2b15cb3dSCy Schubert* Non-cryptographic random number generator with weak seed used by
112*2b15cb3dSCy Schubert  ntp-keygen to generate symmetric keys.
113*2b15cb3dSCy Schubert
114*2b15cb3dSCy Schubert  References: [Sec 2666] / CVE-2014-9294 / VU#852879
115*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
116*2b15cb3dSCy Schubert  Vulnerable Versions: All NTP4 releases before 4.2.7p230
117*2b15cb3dSCy Schubert  Date Resolved: Dev (4.2.7p230) 01 Nov 2011
118*2b15cb3dSCy Schubert
119*2b15cb3dSCy Schubert  Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
120*2b15cb3dSCy Schubert  	prepare a random number generator that was of good quality back
121*2b15cb3dSCy Schubert	in the late 1990s. The random numbers produced was then used to
122*2b15cb3dSCy Schubert	generate symmetric keys. In ntp-4.2.8 we use a current-technology
123*2b15cb3dSCy Schubert	cryptographic random number generator, either RAND_bytes from
124*2b15cb3dSCy Schubert	OpenSSL, or arc4random().
125*2b15cb3dSCy Schubert
126*2b15cb3dSCy Schubert  Mitigation - any of:
127*2b15cb3dSCy Schubert  	- Upgrade to 4.2.7p230 or later.
128*2b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
129*2b15cb3dSCy Schubert
130*2b15cb3dSCy Schubert  Credit:  This vulnerability was discovered in ntp-4.2.6 by
131*2b15cb3dSCy Schubert  	Stephen Roettger of the Google Security Team.
132*2b15cb3dSCy Schubert
133*2b15cb3dSCy Schubert* Buffer overflow in crypto_recv()
134*2b15cb3dSCy Schubert
135*2b15cb3dSCy Schubert  References: Sec 2667 / CVE-2014-9295 / VU#852879
136*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
137*2b15cb3dSCy Schubert  Versions: All releases before 4.2.8
138*2b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
139*2b15cb3dSCy Schubert
140*2b15cb3dSCy Schubert  Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
141*2b15cb3dSCy Schubert  	file contains a 'crypto pw ...' directive) a remote attacker
142*2b15cb3dSCy Schubert	can send a carefully crafted packet that can overflow a stack
143*2b15cb3dSCy Schubert	buffer and potentially allow malicious code to be executed
144*2b15cb3dSCy Schubert	with the privilege level of the ntpd process.
145*2b15cb3dSCy Schubert
146*2b15cb3dSCy Schubert  Mitigation - any of:
147*2b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later, or
148*2b15cb3dSCy Schubert	- Disable Autokey Authentication by removing, or commenting out,
149*2b15cb3dSCy Schubert	  all configuration directives beginning with the crypto keyword
150*2b15cb3dSCy Schubert	  in your ntp.conf file.
151*2b15cb3dSCy Schubert
152*2b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
153*2b15cb3dSCy Schubert  	Google Security Team.
154*2b15cb3dSCy Schubert
155*2b15cb3dSCy Schubert* Buffer overflow in ctl_putdata()
156*2b15cb3dSCy Schubert
157*2b15cb3dSCy Schubert  References: Sec 2668 / CVE-2014-9295 / VU#852879
158*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
159*2b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
160*2b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
161*2b15cb3dSCy Schubert
162*2b15cb3dSCy Schubert  Summary: A remote attacker can send a carefully crafted packet that
163*2b15cb3dSCy Schubert  	can overflow a stack buffer and potentially allow malicious
164*2b15cb3dSCy Schubert	code to be executed with the privilege level of the ntpd process.
165*2b15cb3dSCy Schubert
166*2b15cb3dSCy Schubert  Mitigation - any of:
167*2b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later.
168*2b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
169*2b15cb3dSCy Schubert
170*2b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
171*2b15cb3dSCy Schubert  	Google Security Team.
172*2b15cb3dSCy Schubert
173*2b15cb3dSCy Schubert* Buffer overflow in configure()
174*2b15cb3dSCy Schubert
175*2b15cb3dSCy Schubert  References: Sec 2669 / CVE-2014-9295 / VU#852879
176*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
177*2b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
178*2b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
179*2b15cb3dSCy Schubert
180*2b15cb3dSCy Schubert  Summary: A remote attacker can send a carefully crafted packet that
181*2b15cb3dSCy Schubert	can overflow a stack buffer and potentially allow malicious
182*2b15cb3dSCy Schubert	code to be executed with the privilege level of the ntpd process.
183*2b15cb3dSCy Schubert
184*2b15cb3dSCy Schubert  Mitigation - any of:
185*2b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later.
186*2b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
187*2b15cb3dSCy Schubert
188*2b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
189*2b15cb3dSCy Schubert	Google Security Team.
190*2b15cb3dSCy Schubert
191*2b15cb3dSCy Schubert* receive(): missing return on error
192*2b15cb3dSCy Schubert
193*2b15cb3dSCy Schubert  References: Sec 2670 / CVE-2014-9296 / VU#852879
194*2b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
195*2b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
196*2b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
197*2b15cb3dSCy Schubert
198*2b15cb3dSCy Schubert  Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
199*2b15cb3dSCy Schubert  	the code path where an error was detected, which meant
200*2b15cb3dSCy Schubert	processing did not stop when a specific rare error occurred.
201*2b15cb3dSCy Schubert	We haven't found a way for this bug to affect system integrity.
202*2b15cb3dSCy Schubert	If there is no way to affect system integrity the base CVSS
203*2b15cb3dSCy Schubert	score for this bug is 0. If there is one avenue through which
204*2b15cb3dSCy Schubert	system integrity can be partially affected, the base score
205*2b15cb3dSCy Schubert	becomes a 5. If system integrity can be partially affected
206*2b15cb3dSCy Schubert	via all three integrity metrics, the CVSS base score become 7.5.
207*2b15cb3dSCy Schubert
208*2b15cb3dSCy Schubert  Mitigation - any of:
209*2b15cb3dSCy Schubert        - Upgrade to 4.2.8, or later,
210*2b15cb3dSCy Schubert        - Remove or comment out all configuration directives
211*2b15cb3dSCy Schubert	  beginning with the crypto keyword in your ntp.conf file.
212*2b15cb3dSCy Schubert
213*2b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
214*2b15cb3dSCy Schubert  	Google Security Team.
215*2b15cb3dSCy Schubert
216*2b15cb3dSCy SchubertSee http://support.ntp.org/security for more information.
217*2b15cb3dSCy Schubert
218*2b15cb3dSCy SchubertNew features / changes in this release:
219*2b15cb3dSCy Schubert
220*2b15cb3dSCy SchubertImportant Changes
221*2b15cb3dSCy Schubert
222*2b15cb3dSCy Schubert* Internal NTP Era counters
223*2b15cb3dSCy Schubert
224*2b15cb3dSCy SchubertThe internal counters that track the "era" (range of years) we are in
225*2b15cb3dSCy Schubertrolls over every 136 years'.  The current "era" started at the stroke of
226*2b15cb3dSCy Schubertmidnight on 1 Jan 1900, and ends just before the stroke of midnight on
227*2b15cb3dSCy Schubert1 Jan 2036.
228*2b15cb3dSCy SchubertIn the past, we have used the "midpoint" of the  range to decide which
229*2b15cb3dSCy Schubertera we were in.  Given the longevity of some products, it became clear
230*2b15cb3dSCy Schubertthat it would be more functional to "look back" less, and "look forward"
231*2b15cb3dSCy Schubertmore.  We now compile a timestamp into the ntpd executable and when we
232*2b15cb3dSCy Schubertget a timestamp we us the "built-on" to tell us what era we are in.
233*2b15cb3dSCy SchubertThis check "looks back" 10 years, and "looks forward" 126 years.
234*2b15cb3dSCy Schubert
235*2b15cb3dSCy Schubert* ntpdc responses disabled by default
236*2b15cb3dSCy Schubert
237*2b15cb3dSCy SchubertDave Hart writes:
238*2b15cb3dSCy Schubert
239*2b15cb3dSCy SchubertFor a long time, ntpq and its mostly text-based mode 6 (control)
240*2b15cb3dSCy Schubertprotocol have been preferred over ntpdc and its mode 7 (private
241*2b15cb3dSCy Schubertrequest) protocol for runtime queries and configuration.  There has
242*2b15cb3dSCy Schubertbeen a goal of deprecating ntpdc, previously held back by numerous
243*2b15cb3dSCy Schubertcapabilities exposed by ntpdc with no ntpq equivalent.  I have been
244*2b15cb3dSCy Schubertadding commands to ntpq to cover these cases, and I believe I've
245*2b15cb3dSCy Schubertcovered them all, though I've not compared command-by-command
246*2b15cb3dSCy Schubertrecently.
247*2b15cb3dSCy Schubert
248*2b15cb3dSCy SchubertAs I've said previously, the binary mode 7 protocol involves a lot of
249*2b15cb3dSCy Schuberthand-rolled structure layout and byte-swapping code in both ntpd and
250*2b15cb3dSCy Schubertntpdc which is hard to get right.  As ntpd grows and changes, the
251*2b15cb3dSCy Schubertchanges are difficult to expose via ntpdc while maintaining forward
252*2b15cb3dSCy Schubertand backward compatibility between ntpdc and ntpd.  In contrast,
253*2b15cb3dSCy Schubertntpq's text-based, label=value approach involves more code reuse and
254*2b15cb3dSCy Schubertallows compatible changes without extra work in most cases.
255*2b15cb3dSCy Schubert
256*2b15cb3dSCy SchubertMode 7 has always been defined as vendor/implementation-specific while
257*2b15cb3dSCy Schubertmode 6 is described in RFC 1305 and intended to be open to interoperate
258*2b15cb3dSCy Schubertwith other implementations.  There is an early draft of an updated
259*2b15cb3dSCy Schubertmode 6 description that likely will join the other NTPv4 RFCs
260*2b15cb3dSCy Schuberteventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01)
261*2b15cb3dSCy Schubert
262*2b15cb3dSCy SchubertFor these reasons, ntpd 4.2.7p230 by default disables processing of
263*2b15cb3dSCy Schubertntpdc queries, reducing ntpd's attack surface and functionally
264*2b15cb3dSCy Schubertdeprecating ntpdc.  If you are in the habit of using ntpdc for certain
265*2b15cb3dSCy Schubertoperations, please try the ntpq equivalent.  If there's no equivalent,
266*2b15cb3dSCy Schubertplease open a bug report at http://bugs.ntp.org./
267*2b15cb3dSCy Schubert
268*2b15cb3dSCy SchubertIn addition to the above, over 1100 issues have been resolved between
269*2b15cb3dSCy Schubertthe 4.2.6 branch and 4.2.8.  The ChangeLog file in the distribution
270*2b15cb3dSCy Schubertlists these.
271*2b15cb3dSCy Schubert
272*2b15cb3dSCy Schubert---
273*2b15cb3dSCy SchubertNTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24)
274*2b15cb3dSCy Schubert
275*2b15cb3dSCy SchubertFocus: Bug fixes
276*2b15cb3dSCy Schubert
277*2b15cb3dSCy SchubertSeverity: Medium
278*2b15cb3dSCy Schubert
279*2b15cb3dSCy SchubertThis is a recommended upgrade.
280*2b15cb3dSCy Schubert
281*2b15cb3dSCy SchubertThis release updates sys_rootdisp and sys_jitter calculations to match the
282*2b15cb3dSCy SchubertRFC specification, fixes a potential IPv6 address matching error for the
283*2b15cb3dSCy Schubert"nic" and "interface" configuration directives, suppresses the creation of
284*2b15cb3dSCy Schubertextraneous ephemeral associations for certain broadcastclient and
285*2b15cb3dSCy Schubertmulticastclient configurations, cleans up some ntpq display issues, and
286*2b15cb3dSCy Schubertincludes improvements to orphan mode, minor bugs fixes and code clean-ups.
287*2b15cb3dSCy Schubert
288*2b15cb3dSCy SchubertNew features / changes in this release:
289*2b15cb3dSCy Schubert
290*2b15cb3dSCy Schubertntpd
291*2b15cb3dSCy Schubert
292*2b15cb3dSCy Schubert * Updated "nic" and "interface" IPv6 address handling to prevent
293*2b15cb3dSCy Schubert   mismatches with localhost [::1] and wildcard [::] which resulted from
294*2b15cb3dSCy Schubert   using the address/prefix format (e.g. fe80::/64)
295*2b15cb3dSCy Schubert * Fix orphan mode stratum incorrectly counting to infinity
296*2b15cb3dSCy Schubert * Orphan parent selection metric updated to includes missing ntohl()
297*2b15cb3dSCy Schubert * Non-printable stratum 16 refid no longer sent to ntp
298*2b15cb3dSCy Schubert * Duplicate ephemeral associations suppressed for broadcastclient and
299*2b15cb3dSCy Schubert   multicastclient without broadcastdelay
300*2b15cb3dSCy Schubert * Exclude undetermined sys_refid from use in loopback TEST12
301*2b15cb3dSCy Schubert * Exclude MODE_SERVER responses from KoD rate limiting
302*2b15cb3dSCy Schubert * Include root delay in clock_update() sys_rootdisp calculations
303*2b15cb3dSCy Schubert * get_systime() updated to exclude sys_residual offset (which only
304*2b15cb3dSCy Schubert   affected bits "below" sys_tick, the precision threshold)
305*2b15cb3dSCy Schubert * sys.peer jitter weighting corrected in sys_jitter calculation
306*2b15cb3dSCy Schubert
307*2b15cb3dSCy Schubertntpq
308*2b15cb3dSCy Schubert
309*2b15cb3dSCy Schubert * -n option extended to include the billboard "server" column
310*2b15cb3dSCy Schubert * IPv6 addresses in the local column truncated to prevent overruns
311*2b15cb3dSCy Schubert
312*2b15cb3dSCy Schubert---
313*2b15cb3dSCy SchubertNTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22)
314*2b15cb3dSCy Schubert
315*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
316*2b15cb3dSCy Schubert
317*2b15cb3dSCy SchubertSeverity: Medium
318*2b15cb3dSCy Schubert
319*2b15cb3dSCy SchubertThis is a recommended upgrade.
320*2b15cb3dSCy Schubert
321*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code
322*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
323*2b15cb3dSCy Schubertref-clock issues, and documentation revisions.
324*2b15cb3dSCy Schubert
325*2b15cb3dSCy SchubertPortability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t.
326*2b15cb3dSCy Schubert
327*2b15cb3dSCy SchubertNew features / changes in this release:
328*2b15cb3dSCy Schubert
329*2b15cb3dSCy SchubertBuild system
330*2b15cb3dSCy Schubert
331*2b15cb3dSCy Schubert* Fix checking for struct rtattr
332*2b15cb3dSCy Schubert* Update config.guess and config.sub for AIX
333*2b15cb3dSCy Schubert* Upgrade required version of autogen and libopts for building
334*2b15cb3dSCy Schubert  from our source code repository
335*2b15cb3dSCy Schubert
336*2b15cb3dSCy Schubertntpd
337*2b15cb3dSCy Schubert
338*2b15cb3dSCy Schubert* Back-ported several fixes for Coverity warnings from ntp-dev
339*2b15cb3dSCy Schubert* Fix a rare boundary condition in UNLINK_EXPR_SLIST()
340*2b15cb3dSCy Schubert* Allow "logconfig =allall" configuration directive
341*2b15cb3dSCy Schubert* Bind tentative IPv6 addresses on Linux
342*2b15cb3dSCy Schubert* Correct WWVB/Spectracom driver to timestamp CR instead of LF
343*2b15cb3dSCy Schubert* Improved tally bit handling to prevent incorrect ntpq peer status reports
344*2b15cb3dSCy Schubert* Exclude the Undisciplined Local Clock and ACTS drivers from the initial
345*2b15cb3dSCy Schubert  candidate list unless they are designated a "prefer peer"
346*2b15cb3dSCy Schubert* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for
347*2b15cb3dSCy Schubert  selection during the 'tos orphanwait' period
348*2b15cb3dSCy Schubert* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS
349*2b15cb3dSCy Schubert  drivers
350*2b15cb3dSCy Schubert* Improved support of the Parse Refclock trusttime flag in Meinberg mode
351*2b15cb3dSCy Schubert* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero()
352*2b15cb3dSCy Schubert* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline
353*2b15cb3dSCy Schubert  clock slew on Microsoft Windows
354*2b15cb3dSCy Schubert* Code cleanup in libntpq
355*2b15cb3dSCy Schubert
356*2b15cb3dSCy Schubertntpdc
357*2b15cb3dSCy Schubert
358*2b15cb3dSCy Schubert* Fix timerstats reporting
359*2b15cb3dSCy Schubert
360*2b15cb3dSCy Schubertntpdate
361*2b15cb3dSCy Schubert
362*2b15cb3dSCy Schubert* Reduce time required to set clock
363*2b15cb3dSCy Schubert* Allow a timeout greater than 2 seconds
364*2b15cb3dSCy Schubert
365*2b15cb3dSCy Schubertsntp
366*2b15cb3dSCy Schubert
367*2b15cb3dSCy Schubert* Backward incompatible command-line option change:
368*2b15cb3dSCy Schubert  -l/--filelog changed -l/--logfile (to be consistent with ntpd)
369*2b15cb3dSCy Schubert
370*2b15cb3dSCy SchubertDocumentation
371*2b15cb3dSCy Schubert
372*2b15cb3dSCy Schubert* Update html2man. Fix some tags in the .html files
373*2b15cb3dSCy Schubert* Distribute ntp-wait.html
374*2b15cb3dSCy Schubert
375*2b15cb3dSCy Schubert---
376*2b15cb3dSCy SchubertNTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03)
377*2b15cb3dSCy Schubert
378*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
379*2b15cb3dSCy Schubert
380*2b15cb3dSCy SchubertSeverity: Medium
381*2b15cb3dSCy Schubert
382*2b15cb3dSCy SchubertThis is a recommended upgrade.
383*2b15cb3dSCy Schubert
384*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code
385*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
386*2b15cb3dSCy Schubertref-clock issues, and documentation revisions.
387*2b15cb3dSCy Schubert
388*2b15cb3dSCy SchubertPortability improvements in this release affect AIX, Atari FreeMiNT,
389*2b15cb3dSCy SchubertFreeBSD4, Linux and Microsoft Windows.
390*2b15cb3dSCy Schubert
391*2b15cb3dSCy SchubertNew features / changes in this release:
392*2b15cb3dSCy Schubert
393*2b15cb3dSCy SchubertBuild system
394*2b15cb3dSCy Schubert* Use lsb_release to get information about Linux distributions.
395*2b15cb3dSCy Schubert* 'test' is in /usr/bin (instead of /bin) on some systems.
396*2b15cb3dSCy Schubert* Basic sanity checks for the ChangeLog file.
397*2b15cb3dSCy Schubert* Source certain build files with ./filename for systems without . in PATH.
398*2b15cb3dSCy Schubert* IRIX portability fix.
399*2b15cb3dSCy Schubert* Use a single copy of the "libopts" code.
400*2b15cb3dSCy Schubert* autogen/libopts upgrade.
401*2b15cb3dSCy Schubert* configure.ac m4 quoting cleanup.
402*2b15cb3dSCy Schubert
403*2b15cb3dSCy Schubertntpd
404*2b15cb3dSCy Schubert* Do not bind to IN6_IFF_ANYCAST addresses.
405*2b15cb3dSCy Schubert* Log the reason for exiting under Windows.
406*2b15cb3dSCy Schubert* Multicast fixes for Windows.
407*2b15cb3dSCy Schubert* Interpolation fixes for Windows.
408*2b15cb3dSCy Schubert* IPv4 and IPv6 Multicast fixes.
409*2b15cb3dSCy Schubert* Manycast solicitation fixes and general repairs.
410*2b15cb3dSCy Schubert* JJY refclock cleanup.
411*2b15cb3dSCy Schubert* NMEA refclock improvements.
412*2b15cb3dSCy Schubert* Oncore debug message cleanup.
413*2b15cb3dSCy Schubert* Palisade refclock now builds under Linux.
414*2b15cb3dSCy Schubert* Give RAWDCF more baud rates.
415*2b15cb3dSCy Schubert* Support Truetime Satellite clocks under Windows.
416*2b15cb3dSCy Schubert* Support Arbiter 1093C Satellite clocks under Windows.
417*2b15cb3dSCy Schubert* Make sure that the "filegen" configuration command defaults to "enable".
418*2b15cb3dSCy Schubert* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver.
419*2b15cb3dSCy Schubert* Prohibit 'includefile' directive in remote configuration command.
420*2b15cb3dSCy Schubert* Fix 'nic' interface bindings.
421*2b15cb3dSCy Schubert* Fix the way we link with openssl if openssl is installed in the base
422*2b15cb3dSCy Schubert  system.
423*2b15cb3dSCy Schubert
424*2b15cb3dSCy Schubertntp-keygen
425*2b15cb3dSCy Schubert* Fix -V coredump.
426*2b15cb3dSCy Schubert* OpenSSL version display cleanup.
427*2b15cb3dSCy Schubert
428*2b15cb3dSCy Schubertntpdc
429*2b15cb3dSCy Schubert* Many counters should be treated as unsigned.
430*2b15cb3dSCy Schubert
431*2b15cb3dSCy Schubertntpdate
432*2b15cb3dSCy Schubert* Do not ignore replies with equal receive and transmit timestamps.
433*2b15cb3dSCy Schubert
434*2b15cb3dSCy Schubertntpq
435*2b15cb3dSCy Schubert* libntpq warning cleanup.
436*2b15cb3dSCy Schubert
437*2b15cb3dSCy Schubertntpsnmpd
438*2b15cb3dSCy Schubert* Correct SNMP type for "precision" and "resolution".
439*2b15cb3dSCy Schubert* Update the MIB from the draft version to RFC-5907.
440*2b15cb3dSCy Schubert
441*2b15cb3dSCy Schubertsntp
442*2b15cb3dSCy Schubert* Display timezone offset when showing time for sntp in the local
443*2b15cb3dSCy Schubert  timezone.
444*2b15cb3dSCy Schubert* Pay proper attention to RATE KoD packets.
445*2b15cb3dSCy Schubert* Fix a miscalculation of the offset.
446*2b15cb3dSCy Schubert* Properly parse empty lines in the key file.
447*2b15cb3dSCy Schubert* Logging cleanup.
448*2b15cb3dSCy Schubert* Use tv_usec correctly in set_time().
449*2b15cb3dSCy Schubert* Documentation cleanup.
450*2b15cb3dSCy Schubert
451*2b15cb3dSCy Schubert---
452*2b15cb3dSCy SchubertNTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08)
453*2b15cb3dSCy Schubert
454*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
455*2b15cb3dSCy Schubert
456*2b15cb3dSCy SchubertSeverity: Medium
457*2b15cb3dSCy Schubert
458*2b15cb3dSCy SchubertThis is a recommended upgrade.
459*2b15cb3dSCy Schubert
460*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code
461*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
462*2b15cb3dSCy Schubertref-clock issues, improved KOD handling, OpenSSL related
463*2b15cb3dSCy Schubertupdates and documentation revisions.
464*2b15cb3dSCy Schubert
465*2b15cb3dSCy SchubertPortability improvements in this release affect Irix, Linux,
466*2b15cb3dSCy SchubertMac OS, Microsoft Windows, OpenBSD and QNX6
467*2b15cb3dSCy Schubert
468*2b15cb3dSCy SchubertNew features / changes in this release:
469*2b15cb3dSCy Schubert
470*2b15cb3dSCy Schubertntpd
471*2b15cb3dSCy Schubert* Range syntax for the trustedkey configuration directive
472*2b15cb3dSCy Schubert* Unified IPv4 and IPv6 restrict lists
473*2b15cb3dSCy Schubert
474*2b15cb3dSCy Schubertntpdate
475*2b15cb3dSCy Schubert* Rate limiting and KOD handling
476*2b15cb3dSCy Schubert
477*2b15cb3dSCy Schubertntpsnmpd
478*2b15cb3dSCy Schubert* default connection to net-snmpd via a unix-domain socket
479*2b15cb3dSCy Schubert* command-line 'socket name' option
480*2b15cb3dSCy Schubert
481*2b15cb3dSCy Schubertntpq / ntpdc
482*2b15cb3dSCy Schubert* support for the "passwd ..." syntax
483*2b15cb3dSCy Schubert* key-type specific password prompts
484*2b15cb3dSCy Schubert
485*2b15cb3dSCy Schubertsntp
486*2b15cb3dSCy Schubert* MD5 authentication of an ntpd
487*2b15cb3dSCy Schubert* Broadcast and crypto
488*2b15cb3dSCy Schubert* OpenSSL support
489*2b15cb3dSCy Schubert
490*2b15cb3dSCy Schubert---
491*2b15cb3dSCy SchubertNTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09)
492*2b15cb3dSCy Schubert
493*2b15cb3dSCy SchubertFocus: Bug fixes, portability fixes, and documentation improvements
494*2b15cb3dSCy Schubert
495*2b15cb3dSCy SchubertSeverity: Medium
496*2b15cb3dSCy Schubert
497*2b15cb3dSCy SchubertThis is a recommended upgrade.
498*2b15cb3dSCy Schubert
499*2b15cb3dSCy Schubert---
500*2b15cb3dSCy SchubertNTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
501*2b15cb3dSCy Schubert
502*2b15cb3dSCy SchubertFocus: enhancements and bug fixes.
503*2b15cb3dSCy Schubert
504*2b15cb3dSCy Schubert---
505eb6d21b4SOllivier RobertNTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
506eb6d21b4SOllivier Robert
507eb6d21b4SOllivier RobertFocus: Security Fixes
508eb6d21b4SOllivier Robert
509eb6d21b4SOllivier RobertSeverity: HIGH
510eb6d21b4SOllivier Robert
511eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability:
512eb6d21b4SOllivier Robert
513eb6d21b4SOllivier Robert* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
514eb6d21b4SOllivier Robert
515eb6d21b4SOllivier Robert  See http://support.ntp.org/security for more information.
516eb6d21b4SOllivier Robert
517eb6d21b4SOllivier Robert  NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
518eb6d21b4SOllivier Robert  In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
519eb6d21b4SOllivier Robert  transfers use modes 1 through 5.  Upon receipt of an incorrect mode 7
520eb6d21b4SOllivier Robert  request or a mode 7 error response from an address which is not listed
521eb6d21b4SOllivier Robert  in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
522eb6d21b4SOllivier Robert  reply with a mode 7 error response (and log a message).  In this case:
523eb6d21b4SOllivier Robert
524eb6d21b4SOllivier Robert	* If an attacker spoofs the source address of ntpd host A in a
525eb6d21b4SOllivier Robert	  mode 7 response packet sent to ntpd host B, both A and B will
526eb6d21b4SOllivier Robert	  continuously send each other error responses, for as long as
527eb6d21b4SOllivier Robert	  those packets get through.
528eb6d21b4SOllivier Robert
529eb6d21b4SOllivier Robert	* If an attacker spoofs an address of ntpd host A in a mode 7
530eb6d21b4SOllivier Robert	  response packet sent to ntpd host A, A will respond to itself
531eb6d21b4SOllivier Robert	  endlessly, consuming CPU and logging excessively.
532eb6d21b4SOllivier Robert
533eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Robin Park and Dmitri
534eb6d21b4SOllivier Robert  Vinokurov of Alcatel-Lucent.
535eb6d21b4SOllivier Robert
536eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE.
537eb6d21b4SOllivier Robert
538eb6d21b4SOllivier Robert---
539*2b15cb3dSCy Schubertntpd now syncs to refclocks right away.
540*2b15cb3dSCy Schubert
541*2b15cb3dSCy SchubertBackward-Incompatible changes:
542*2b15cb3dSCy Schubert
543*2b15cb3dSCy Schubertntpd no longer accepts '-v name' or '-V name' to define internal variables.
544*2b15cb3dSCy SchubertUse '--var name' or '--dvar name' instead. (Bug 817)
545*2b15cb3dSCy Schubert
546*2b15cb3dSCy Schubert---
547eb6d21b4SOllivier RobertNTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
548eb6d21b4SOllivier Robert
549eb6d21b4SOllivier RobertFocus: Security and Bug Fixes
550eb6d21b4SOllivier Robert
551eb6d21b4SOllivier RobertSeverity: HIGH
552eb6d21b4SOllivier Robert
553eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability:
554eb6d21b4SOllivier Robert
555eb6d21b4SOllivier Robert* [Sec 1151] Remote exploit if autokey is enabled.  CVE-2009-1252
556eb6d21b4SOllivier Robert
557eb6d21b4SOllivier Robert  See http://support.ntp.org/security for more information.
558eb6d21b4SOllivier Robert
559eb6d21b4SOllivier Robert  If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
560eb6d21b4SOllivier Robert  line) then a carefully crafted packet sent to the machine will cause
561eb6d21b4SOllivier Robert  a buffer overflow and possible execution of injected code, running
562eb6d21b4SOllivier Robert  with the privileges of the ntpd process (often root).
563eb6d21b4SOllivier Robert
564eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Chris Ries of CMU.
565eb6d21b4SOllivier Robert
566eb6d21b4SOllivier RobertThis release fixes the following low-severity vulnerabilities:
567eb6d21b4SOllivier Robert
568eb6d21b4SOllivier Robert* [Sec 1144] limited (two byte) buffer overflow in ntpq.  CVE-2009-0159
569eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Geoff Keating of Apple.
570eb6d21b4SOllivier Robert
571eb6d21b4SOllivier Robert* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
572eb6d21b4SOllivier Robert  Credit for finding this issue goes to Dave Hart.
573eb6d21b4SOllivier Robert
574eb6d21b4SOllivier RobertThis release fixes a number of bugs and adds some improvements:
575eb6d21b4SOllivier Robert
576eb6d21b4SOllivier Robert* Improved logging
577eb6d21b4SOllivier Robert* Fix many compiler warnings
578eb6d21b4SOllivier Robert* Many fixes and improvements for Windows
579eb6d21b4SOllivier Robert* Adds support for AIX 6.1
580eb6d21b4SOllivier Robert* Resolves some issues under MacOS X and Solaris
581eb6d21b4SOllivier Robert
582eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE.
583eb6d21b4SOllivier Robert
584eb6d21b4SOllivier Robert---
585eb6d21b4SOllivier RobertNTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
586eb6d21b4SOllivier Robert
587eb6d21b4SOllivier RobertFocus: Security Fix
588eb6d21b4SOllivier Robert
589eb6d21b4SOllivier RobertSeverity: Low
590eb6d21b4SOllivier Robert
591eb6d21b4SOllivier RobertThis release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
592eb6d21b4SOllivier Robertthe OpenSSL library relating to the incorrect checking of the return
593eb6d21b4SOllivier Robertvalue of EVP_VerifyFinal function.
594eb6d21b4SOllivier Robert
595eb6d21b4SOllivier RobertCredit for finding this issue goes to the Google Security Team for
596eb6d21b4SOllivier Robertfinding the original issue with OpenSSL, and to ocert.org for finding
597eb6d21b4SOllivier Robertthe problem in NTP and telling us about it.
598eb6d21b4SOllivier Robert
599eb6d21b4SOllivier RobertThis is a recommended upgrade.
600eb6d21b4SOllivier Robert---
601ea906c41SOllivier RobertNTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
602ea906c41SOllivier Robert
603ea906c41SOllivier RobertFocus: Minor Bugfixes
604ea906c41SOllivier Robert
605ea906c41SOllivier RobertThis release fixes a number of Windows-specific ntpd bugs and
606ea906c41SOllivier Robertplatform-independent ntpdate bugs. A logging bugfix has been applied
607ea906c41SOllivier Robertto the ONCORE driver.
608ea906c41SOllivier Robert
609ea906c41SOllivier RobertThe "dynamic" keyword and is now obsolete and deferred binding to local
610ea906c41SOllivier Robertinterfaces is the new default. The minimum time restriction for the
611ea906c41SOllivier Robertinterface update interval has been dropped.
612ea906c41SOllivier Robert
613ea906c41SOllivier RobertA number of minor build system and documentation fixes are included.
614ea906c41SOllivier Robert
615ea906c41SOllivier RobertThis is a recommended upgrade for Windows.
616ea906c41SOllivier Robert
617ea906c41SOllivier Robert---
618ea906c41SOllivier RobertNTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
619ea906c41SOllivier Robert
620ea906c41SOllivier RobertFocus: Minor Bugfixes
621ea906c41SOllivier Robert
622ea906c41SOllivier RobertThis release updates certain copyright information, fixes several display
623ea906c41SOllivier Robertbugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
624ea906c41SOllivier Robertshutdown in the parse refclock driver, removes some lint from the code,
625ea906c41SOllivier Robertstops accessing certain buffers immediately after they were freed, fixes
626ea906c41SOllivier Roberta problem with non-command-line specification of -6, and allows the loopback
627ea906c41SOllivier Robertinterface to share addresses with other interfaces.
628ea906c41SOllivier Robert
629ea906c41SOllivier Robert---
630ea906c41SOllivier RobertNTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
631ea906c41SOllivier Robert
632ea906c41SOllivier RobertFocus: Minor Bugfixes
633ea906c41SOllivier Robert
634ea906c41SOllivier RobertThis release fixes a bug in Windows that made it difficult to
635ea906c41SOllivier Robertterminate ntpd under windows.
636ea906c41SOllivier RobertThis is a recommended upgrade for Windows.
637ea906c41SOllivier Robert
638ea906c41SOllivier Robert---
639ea906c41SOllivier RobertNTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
640ea906c41SOllivier Robert
641ea906c41SOllivier RobertFocus: Minor Bugfixes
642ea906c41SOllivier Robert
643ea906c41SOllivier RobertThis release fixes a multicast mode authentication problem,
644ea906c41SOllivier Robertan error in NTP packet handling on Windows that could lead to
645ea906c41SOllivier Robertntpd crashing, and several other minor bugs. Handling of
646ea906c41SOllivier Robertmulticast interfaces and logging configuration were improved.
647ea906c41SOllivier RobertThe required versions of autogen and libopts were incremented.
648ea906c41SOllivier RobertThis is a recommended upgrade for Windows and multicast users.
649ea906c41SOllivier Robert
650ea906c41SOllivier Robert---
651ea906c41SOllivier RobertNTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
652ea906c41SOllivier Robert
653ea906c41SOllivier RobertFocus: enhancements and bug fixes.
654ea906c41SOllivier Robert
655ea906c41SOllivier RobertDynamic interface rescanning was added to simplify the use of ntpd in
656ea906c41SOllivier Robertconjunction with DHCP. GNU AutoGen is used for its command-line options
657ea906c41SOllivier Robertprocessing. Separate PPS devices are supported for PARSE refclocks, MD5
658ea906c41SOllivier Robertsignatures are now provided for the release files. Drivers have been
659ea906c41SOllivier Robertadded for some new ref-clocks and have been removed for some older
660ea906c41SOllivier Robertref-clocks. This release also includes other improvements, documentation
661ea906c41SOllivier Robertand bug fixes.
662ea906c41SOllivier Robert
663ea906c41SOllivier RobertK&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
664ea906c41SOllivier RobertC support.
665ea906c41SOllivier Robert
666ea906c41SOllivier Robert---
667ea906c41SOllivier RobertNTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
668ea906c41SOllivier Robert
669ea906c41SOllivier RobertFocus: enhancements and bug fixes.
670