1*2b15cb3dSCy Schubert--- 2*2b15cb3dSCy SchubertNTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 3*2b15cb3dSCy Schubert 4*2b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements. 5*2b15cb3dSCy Schubert 6*2b15cb3dSCy SchubertSeverity: HIGH 7*2b15cb3dSCy Schubert 8*2b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the 9*2b15cb3dSCy Schubertfollowing high-severity vulnerabilities: 10*2b15cb3dSCy Schubert 11*2b15cb3dSCy Schubert* vallen is not validated in several places in ntp_crypto.c, leading 12*2b15cb3dSCy Schubert to a potential information leak or possibly a crash 13*2b15cb3dSCy Schubert 14*2b15cb3dSCy Schubert References: Sec 2671 / CVE-2014-9297 / VU#852879 15*2b15cb3dSCy Schubert Affects: All NTP4 releases before 4.2.8p1 that are running autokey. 16*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 17*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8p1) 04 Feb 2015 18*2b15cb3dSCy Schubert Summary: The vallen packet value is not validated in several code 19*2b15cb3dSCy Schubert paths in ntp_crypto.c which can lead to information leakage 20*2b15cb3dSCy Schubert or perhaps a crash of the ntpd process. 21*2b15cb3dSCy Schubert Mitigation - any of: 22*2b15cb3dSCy Schubert Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 23*2b15cb3dSCy Schubert or the NTP Public Services Project Download Page. 24*2b15cb3dSCy Schubert Disable Autokey Authentication by removing, or commenting out, 25*2b15cb3dSCy Schubert all configuration directives beginning with the "crypto" 26*2b15cb3dSCy Schubert keyword in your ntp.conf file. 27*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 28*2b15cb3dSCy Schubert Google Security Team, with additional cases found by Sebastian 29*2b15cb3dSCy Schubert Krahmer of the SUSE Security Team and Harlan Stenn of Network 30*2b15cb3dSCy Schubert Time Foundation. 31*2b15cb3dSCy Schubert 32*2b15cb3dSCy Schubert* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses 33*2b15cb3dSCy Schubert can be bypassed. 34*2b15cb3dSCy Schubert 35*2b15cb3dSCy Schubert References: Sec 2672 / CVE-2014-9298 / VU#852879 36*2b15cb3dSCy Schubert Affects: All NTP4 releases before 4.2.8p1, under at least some 37*2b15cb3dSCy Schubert versions of MacOS and Linux. *BSD has not been seen to be vulnerable. 38*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9 39*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8p1) 04 Feb 2014 40*2b15cb3dSCy Schubert Summary: While available kernels will prevent 127.0.0.1 addresses 41*2b15cb3dSCy Schubert from "appearing" on non-localhost IPv4 interfaces, some kernels 42*2b15cb3dSCy Schubert do not offer the same protection for ::1 source addresses on 43*2b15cb3dSCy Schubert IPv6 interfaces. Since NTP's access control is based on source 44*2b15cb3dSCy Schubert address and localhost addresses generally have no restrictions, 45*2b15cb3dSCy Schubert an attacker can send malicious control and configuration packets 46*2b15cb3dSCy Schubert by spoofing ::1 addresses from the outside. Note Well: This is 47*2b15cb3dSCy Schubert not really a bug in NTP, it's a problem with some OSes. If you 48*2b15cb3dSCy Schubert have one of these OSes where ::1 can be spoofed, ALL ::1 -based 49*2b15cb3dSCy Schubert ACL restrictions on any application can be bypassed! 50*2b15cb3dSCy Schubert Mitigation: 51*2b15cb3dSCy Schubert Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 52*2b15cb3dSCy Schubert or the NTP Public Services Project Download Page 53*2b15cb3dSCy Schubert Install firewall rules to block packets claiming to come from 54*2b15cb3dSCy Schubert ::1 from inappropriate network interfaces. 55*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of 56*2b15cb3dSCy Schubert the Google Security Team. 57*2b15cb3dSCy Schubert 58*2b15cb3dSCy SchubertAdditionally, over 30 bugfixes and improvements were made to the codebase. 59*2b15cb3dSCy SchubertSee the ChangeLog for more information. 60*2b15cb3dSCy Schubert 61*2b15cb3dSCy Schubert--- 62*2b15cb3dSCy SchubertNTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 63*2b15cb3dSCy Schubert 64*2b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements. 65*2b15cb3dSCy Schubert 66*2b15cb3dSCy SchubertSeverity: HIGH 67*2b15cb3dSCy Schubert 68*2b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the 69*2b15cb3dSCy Schubertfollowing high-severity vulnerabilities: 70*2b15cb3dSCy Schubert 71*2b15cb3dSCy Schubert************************** vv NOTE WELL vv ***************************** 72*2b15cb3dSCy Schubert 73*2b15cb3dSCy SchubertThe vulnerabilities listed below can be significantly mitigated by 74*2b15cb3dSCy Schubertfollowing the BCP of putting 75*2b15cb3dSCy Schubert 76*2b15cb3dSCy Schubert restrict default ... noquery 77*2b15cb3dSCy Schubert 78*2b15cb3dSCy Schubertin the ntp.conf file. With the exception of: 79*2b15cb3dSCy Schubert 80*2b15cb3dSCy Schubert receive(): missing return on error 81*2b15cb3dSCy Schubert References: Sec 2670 / CVE-2014-9296 / VU#852879 82*2b15cb3dSCy Schubert 83*2b15cb3dSCy Schubertbelow (which is a limited-risk vulnerability), none of the recent 84*2b15cb3dSCy Schubertvulnerabilities listed below can be exploited if the source IP is 85*2b15cb3dSCy Schubertrestricted from sending a 'query'-class packet by your ntp.conf file. 86*2b15cb3dSCy Schubert 87*2b15cb3dSCy Schubert************************** ^^ NOTE WELL ^^ ***************************** 88*2b15cb3dSCy Schubert 89*2b15cb3dSCy Schubert* Weak default key in config_auth(). 90*2b15cb3dSCy Schubert 91*2b15cb3dSCy Schubert References: [Sec 2665] / CVE-2014-9293 / VU#852879 92*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 93*2b15cb3dSCy Schubert Vulnerable Versions: all releases prior to 4.2.7p11 94*2b15cb3dSCy Schubert Date Resolved: 28 Jan 2010 95*2b15cb3dSCy Schubert 96*2b15cb3dSCy Schubert Summary: If no 'auth' key is set in the configuration file, ntpd 97*2b15cb3dSCy Schubert would generate a random key on the fly. There were two 98*2b15cb3dSCy Schubert problems with this: 1) the generated key was 31 bits in size, 99*2b15cb3dSCy Schubert and 2) it used the (now weak) ntp_random() function, which was 100*2b15cb3dSCy Schubert seeded with a 32-bit value and could only provide 32 bits of 101*2b15cb3dSCy Schubert entropy. This was sufficient back in the late 1990s when the 102*2b15cb3dSCy Schubert code was written. Not today. 103*2b15cb3dSCy Schubert 104*2b15cb3dSCy Schubert Mitigation - any of: 105*2b15cb3dSCy Schubert - Upgrade to 4.2.7p11 or later. 106*2b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 107*2b15cb3dSCy Schubert 108*2b15cb3dSCy Schubert Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta 109*2b15cb3dSCy Schubert of the Google Security Team. 110*2b15cb3dSCy Schubert 111*2b15cb3dSCy Schubert* Non-cryptographic random number generator with weak seed used by 112*2b15cb3dSCy Schubert ntp-keygen to generate symmetric keys. 113*2b15cb3dSCy Schubert 114*2b15cb3dSCy Schubert References: [Sec 2666] / CVE-2014-9294 / VU#852879 115*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 116*2b15cb3dSCy Schubert Vulnerable Versions: All NTP4 releases before 4.2.7p230 117*2b15cb3dSCy Schubert Date Resolved: Dev (4.2.7p230) 01 Nov 2011 118*2b15cb3dSCy Schubert 119*2b15cb3dSCy Schubert Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to 120*2b15cb3dSCy Schubert prepare a random number generator that was of good quality back 121*2b15cb3dSCy Schubert in the late 1990s. The random numbers produced was then used to 122*2b15cb3dSCy Schubert generate symmetric keys. In ntp-4.2.8 we use a current-technology 123*2b15cb3dSCy Schubert cryptographic random number generator, either RAND_bytes from 124*2b15cb3dSCy Schubert OpenSSL, or arc4random(). 125*2b15cb3dSCy Schubert 126*2b15cb3dSCy Schubert Mitigation - any of: 127*2b15cb3dSCy Schubert - Upgrade to 4.2.7p230 or later. 128*2b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 129*2b15cb3dSCy Schubert 130*2b15cb3dSCy Schubert Credit: This vulnerability was discovered in ntp-4.2.6 by 131*2b15cb3dSCy Schubert Stephen Roettger of the Google Security Team. 132*2b15cb3dSCy Schubert 133*2b15cb3dSCy Schubert* Buffer overflow in crypto_recv() 134*2b15cb3dSCy Schubert 135*2b15cb3dSCy Schubert References: Sec 2667 / CVE-2014-9295 / VU#852879 136*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 137*2b15cb3dSCy Schubert Versions: All releases before 4.2.8 138*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 139*2b15cb3dSCy Schubert 140*2b15cb3dSCy Schubert Summary: When Autokey Authentication is enabled (i.e. the ntp.conf 141*2b15cb3dSCy Schubert file contains a 'crypto pw ...' directive) a remote attacker 142*2b15cb3dSCy Schubert can send a carefully crafted packet that can overflow a stack 143*2b15cb3dSCy Schubert buffer and potentially allow malicious code to be executed 144*2b15cb3dSCy Schubert with the privilege level of the ntpd process. 145*2b15cb3dSCy Schubert 146*2b15cb3dSCy Schubert Mitigation - any of: 147*2b15cb3dSCy Schubert - Upgrade to 4.2.8, or later, or 148*2b15cb3dSCy Schubert - Disable Autokey Authentication by removing, or commenting out, 149*2b15cb3dSCy Schubert all configuration directives beginning with the crypto keyword 150*2b15cb3dSCy Schubert in your ntp.conf file. 151*2b15cb3dSCy Schubert 152*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 153*2b15cb3dSCy Schubert Google Security Team. 154*2b15cb3dSCy Schubert 155*2b15cb3dSCy Schubert* Buffer overflow in ctl_putdata() 156*2b15cb3dSCy Schubert 157*2b15cb3dSCy Schubert References: Sec 2668 / CVE-2014-9295 / VU#852879 158*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 159*2b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 160*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 161*2b15cb3dSCy Schubert 162*2b15cb3dSCy Schubert Summary: A remote attacker can send a carefully crafted packet that 163*2b15cb3dSCy Schubert can overflow a stack buffer and potentially allow malicious 164*2b15cb3dSCy Schubert code to be executed with the privilege level of the ntpd process. 165*2b15cb3dSCy Schubert 166*2b15cb3dSCy Schubert Mitigation - any of: 167*2b15cb3dSCy Schubert - Upgrade to 4.2.8, or later. 168*2b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 169*2b15cb3dSCy Schubert 170*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 171*2b15cb3dSCy Schubert Google Security Team. 172*2b15cb3dSCy Schubert 173*2b15cb3dSCy Schubert* Buffer overflow in configure() 174*2b15cb3dSCy Schubert 175*2b15cb3dSCy Schubert References: Sec 2669 / CVE-2014-9295 / VU#852879 176*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 177*2b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 178*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 179*2b15cb3dSCy Schubert 180*2b15cb3dSCy Schubert Summary: A remote attacker can send a carefully crafted packet that 181*2b15cb3dSCy Schubert can overflow a stack buffer and potentially allow malicious 182*2b15cb3dSCy Schubert code to be executed with the privilege level of the ntpd process. 183*2b15cb3dSCy Schubert 184*2b15cb3dSCy Schubert Mitigation - any of: 185*2b15cb3dSCy Schubert - Upgrade to 4.2.8, or later. 186*2b15cb3dSCy Schubert - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 187*2b15cb3dSCy Schubert 188*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 189*2b15cb3dSCy Schubert Google Security Team. 190*2b15cb3dSCy Schubert 191*2b15cb3dSCy Schubert* receive(): missing return on error 192*2b15cb3dSCy Schubert 193*2b15cb3dSCy Schubert References: Sec 2670 / CVE-2014-9296 / VU#852879 194*2b15cb3dSCy Schubert CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0 195*2b15cb3dSCy Schubert Versions: All NTP4 releases before 4.2.8 196*2b15cb3dSCy Schubert Date Resolved: Stable (4.2.8) 18 Dec 2014 197*2b15cb3dSCy Schubert 198*2b15cb3dSCy Schubert Summary: Code in ntp_proto.c:receive() was missing a 'return;' in 199*2b15cb3dSCy Schubert the code path where an error was detected, which meant 200*2b15cb3dSCy Schubert processing did not stop when a specific rare error occurred. 201*2b15cb3dSCy Schubert We haven't found a way for this bug to affect system integrity. 202*2b15cb3dSCy Schubert If there is no way to affect system integrity the base CVSS 203*2b15cb3dSCy Schubert score for this bug is 0. If there is one avenue through which 204*2b15cb3dSCy Schubert system integrity can be partially affected, the base score 205*2b15cb3dSCy Schubert becomes a 5. If system integrity can be partially affected 206*2b15cb3dSCy Schubert via all three integrity metrics, the CVSS base score become 7.5. 207*2b15cb3dSCy Schubert 208*2b15cb3dSCy Schubert Mitigation - any of: 209*2b15cb3dSCy Schubert - Upgrade to 4.2.8, or later, 210*2b15cb3dSCy Schubert - Remove or comment out all configuration directives 211*2b15cb3dSCy Schubert beginning with the crypto keyword in your ntp.conf file. 212*2b15cb3dSCy Schubert 213*2b15cb3dSCy Schubert Credit: This vulnerability was discovered by Stephen Roettger of the 214*2b15cb3dSCy Schubert Google Security Team. 215*2b15cb3dSCy Schubert 216*2b15cb3dSCy SchubertSee http://support.ntp.org/security for more information. 217*2b15cb3dSCy Schubert 218*2b15cb3dSCy SchubertNew features / changes in this release: 219*2b15cb3dSCy Schubert 220*2b15cb3dSCy SchubertImportant Changes 221*2b15cb3dSCy Schubert 222*2b15cb3dSCy Schubert* Internal NTP Era counters 223*2b15cb3dSCy Schubert 224*2b15cb3dSCy SchubertThe internal counters that track the "era" (range of years) we are in 225*2b15cb3dSCy Schubertrolls over every 136 years'. The current "era" started at the stroke of 226*2b15cb3dSCy Schubertmidnight on 1 Jan 1900, and ends just before the stroke of midnight on 227*2b15cb3dSCy Schubert1 Jan 2036. 228*2b15cb3dSCy SchubertIn the past, we have used the "midpoint" of the range to decide which 229*2b15cb3dSCy Schubertera we were in. Given the longevity of some products, it became clear 230*2b15cb3dSCy Schubertthat it would be more functional to "look back" less, and "look forward" 231*2b15cb3dSCy Schubertmore. We now compile a timestamp into the ntpd executable and when we 232*2b15cb3dSCy Schubertget a timestamp we us the "built-on" to tell us what era we are in. 233*2b15cb3dSCy SchubertThis check "looks back" 10 years, and "looks forward" 126 years. 234*2b15cb3dSCy Schubert 235*2b15cb3dSCy Schubert* ntpdc responses disabled by default 236*2b15cb3dSCy Schubert 237*2b15cb3dSCy SchubertDave Hart writes: 238*2b15cb3dSCy Schubert 239*2b15cb3dSCy SchubertFor a long time, ntpq and its mostly text-based mode 6 (control) 240*2b15cb3dSCy Schubertprotocol have been preferred over ntpdc and its mode 7 (private 241*2b15cb3dSCy Schubertrequest) protocol for runtime queries and configuration. There has 242*2b15cb3dSCy Schubertbeen a goal of deprecating ntpdc, previously held back by numerous 243*2b15cb3dSCy Schubertcapabilities exposed by ntpdc with no ntpq equivalent. I have been 244*2b15cb3dSCy Schubertadding commands to ntpq to cover these cases, and I believe I've 245*2b15cb3dSCy Schubertcovered them all, though I've not compared command-by-command 246*2b15cb3dSCy Schubertrecently. 247*2b15cb3dSCy Schubert 248*2b15cb3dSCy SchubertAs I've said previously, the binary mode 7 protocol involves a lot of 249*2b15cb3dSCy Schuberthand-rolled structure layout and byte-swapping code in both ntpd and 250*2b15cb3dSCy Schubertntpdc which is hard to get right. As ntpd grows and changes, the 251*2b15cb3dSCy Schubertchanges are difficult to expose via ntpdc while maintaining forward 252*2b15cb3dSCy Schubertand backward compatibility between ntpdc and ntpd. In contrast, 253*2b15cb3dSCy Schubertntpq's text-based, label=value approach involves more code reuse and 254*2b15cb3dSCy Schubertallows compatible changes without extra work in most cases. 255*2b15cb3dSCy Schubert 256*2b15cb3dSCy SchubertMode 7 has always been defined as vendor/implementation-specific while 257*2b15cb3dSCy Schubertmode 6 is described in RFC 1305 and intended to be open to interoperate 258*2b15cb3dSCy Schubertwith other implementations. There is an early draft of an updated 259*2b15cb3dSCy Schubertmode 6 description that likely will join the other NTPv4 RFCs 260*2b15cb3dSCy Schuberteventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01) 261*2b15cb3dSCy Schubert 262*2b15cb3dSCy SchubertFor these reasons, ntpd 4.2.7p230 by default disables processing of 263*2b15cb3dSCy Schubertntpdc queries, reducing ntpd's attack surface and functionally 264*2b15cb3dSCy Schubertdeprecating ntpdc. If you are in the habit of using ntpdc for certain 265*2b15cb3dSCy Schubertoperations, please try the ntpq equivalent. If there's no equivalent, 266*2b15cb3dSCy Schubertplease open a bug report at http://bugs.ntp.org./ 267*2b15cb3dSCy Schubert 268*2b15cb3dSCy SchubertIn addition to the above, over 1100 issues have been resolved between 269*2b15cb3dSCy Schubertthe 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution 270*2b15cb3dSCy Schubertlists these. 271*2b15cb3dSCy Schubert 272*2b15cb3dSCy Schubert--- 273*2b15cb3dSCy SchubertNTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 274*2b15cb3dSCy Schubert 275*2b15cb3dSCy SchubertFocus: Bug fixes 276*2b15cb3dSCy Schubert 277*2b15cb3dSCy SchubertSeverity: Medium 278*2b15cb3dSCy Schubert 279*2b15cb3dSCy SchubertThis is a recommended upgrade. 280*2b15cb3dSCy Schubert 281*2b15cb3dSCy SchubertThis release updates sys_rootdisp and sys_jitter calculations to match the 282*2b15cb3dSCy SchubertRFC specification, fixes a potential IPv6 address matching error for the 283*2b15cb3dSCy Schubert"nic" and "interface" configuration directives, suppresses the creation of 284*2b15cb3dSCy Schubertextraneous ephemeral associations for certain broadcastclient and 285*2b15cb3dSCy Schubertmulticastclient configurations, cleans up some ntpq display issues, and 286*2b15cb3dSCy Schubertincludes improvements to orphan mode, minor bugs fixes and code clean-ups. 287*2b15cb3dSCy Schubert 288*2b15cb3dSCy SchubertNew features / changes in this release: 289*2b15cb3dSCy Schubert 290*2b15cb3dSCy Schubertntpd 291*2b15cb3dSCy Schubert 292*2b15cb3dSCy Schubert * Updated "nic" and "interface" IPv6 address handling to prevent 293*2b15cb3dSCy Schubert mismatches with localhost [::1] and wildcard [::] which resulted from 294*2b15cb3dSCy Schubert using the address/prefix format (e.g. fe80::/64) 295*2b15cb3dSCy Schubert * Fix orphan mode stratum incorrectly counting to infinity 296*2b15cb3dSCy Schubert * Orphan parent selection metric updated to includes missing ntohl() 297*2b15cb3dSCy Schubert * Non-printable stratum 16 refid no longer sent to ntp 298*2b15cb3dSCy Schubert * Duplicate ephemeral associations suppressed for broadcastclient and 299*2b15cb3dSCy Schubert multicastclient without broadcastdelay 300*2b15cb3dSCy Schubert * Exclude undetermined sys_refid from use in loopback TEST12 301*2b15cb3dSCy Schubert * Exclude MODE_SERVER responses from KoD rate limiting 302*2b15cb3dSCy Schubert * Include root delay in clock_update() sys_rootdisp calculations 303*2b15cb3dSCy Schubert * get_systime() updated to exclude sys_residual offset (which only 304*2b15cb3dSCy Schubert affected bits "below" sys_tick, the precision threshold) 305*2b15cb3dSCy Schubert * sys.peer jitter weighting corrected in sys_jitter calculation 306*2b15cb3dSCy Schubert 307*2b15cb3dSCy Schubertntpq 308*2b15cb3dSCy Schubert 309*2b15cb3dSCy Schubert * -n option extended to include the billboard "server" column 310*2b15cb3dSCy Schubert * IPv6 addresses in the local column truncated to prevent overruns 311*2b15cb3dSCy Schubert 312*2b15cb3dSCy Schubert--- 313*2b15cb3dSCy SchubertNTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 314*2b15cb3dSCy Schubert 315*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 316*2b15cb3dSCy Schubert 317*2b15cb3dSCy SchubertSeverity: Medium 318*2b15cb3dSCy Schubert 319*2b15cb3dSCy SchubertThis is a recommended upgrade. 320*2b15cb3dSCy Schubert 321*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code 322*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 323*2b15cb3dSCy Schubertref-clock issues, and documentation revisions. 324*2b15cb3dSCy Schubert 325*2b15cb3dSCy SchubertPortability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 326*2b15cb3dSCy Schubert 327*2b15cb3dSCy SchubertNew features / changes in this release: 328*2b15cb3dSCy Schubert 329*2b15cb3dSCy SchubertBuild system 330*2b15cb3dSCy Schubert 331*2b15cb3dSCy Schubert* Fix checking for struct rtattr 332*2b15cb3dSCy Schubert* Update config.guess and config.sub for AIX 333*2b15cb3dSCy Schubert* Upgrade required version of autogen and libopts for building 334*2b15cb3dSCy Schubert from our source code repository 335*2b15cb3dSCy Schubert 336*2b15cb3dSCy Schubertntpd 337*2b15cb3dSCy Schubert 338*2b15cb3dSCy Schubert* Back-ported several fixes for Coverity warnings from ntp-dev 339*2b15cb3dSCy Schubert* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 340*2b15cb3dSCy Schubert* Allow "logconfig =allall" configuration directive 341*2b15cb3dSCy Schubert* Bind tentative IPv6 addresses on Linux 342*2b15cb3dSCy Schubert* Correct WWVB/Spectracom driver to timestamp CR instead of LF 343*2b15cb3dSCy Schubert* Improved tally bit handling to prevent incorrect ntpq peer status reports 344*2b15cb3dSCy Schubert* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 345*2b15cb3dSCy Schubert candidate list unless they are designated a "prefer peer" 346*2b15cb3dSCy Schubert* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 347*2b15cb3dSCy Schubert selection during the 'tos orphanwait' period 348*2b15cb3dSCy Schubert* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 349*2b15cb3dSCy Schubert drivers 350*2b15cb3dSCy Schubert* Improved support of the Parse Refclock trusttime flag in Meinberg mode 351*2b15cb3dSCy Schubert* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 352*2b15cb3dSCy Schubert* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 353*2b15cb3dSCy Schubert clock slew on Microsoft Windows 354*2b15cb3dSCy Schubert* Code cleanup in libntpq 355*2b15cb3dSCy Schubert 356*2b15cb3dSCy Schubertntpdc 357*2b15cb3dSCy Schubert 358*2b15cb3dSCy Schubert* Fix timerstats reporting 359*2b15cb3dSCy Schubert 360*2b15cb3dSCy Schubertntpdate 361*2b15cb3dSCy Schubert 362*2b15cb3dSCy Schubert* Reduce time required to set clock 363*2b15cb3dSCy Schubert* Allow a timeout greater than 2 seconds 364*2b15cb3dSCy Schubert 365*2b15cb3dSCy Schubertsntp 366*2b15cb3dSCy Schubert 367*2b15cb3dSCy Schubert* Backward incompatible command-line option change: 368*2b15cb3dSCy Schubert -l/--filelog changed -l/--logfile (to be consistent with ntpd) 369*2b15cb3dSCy Schubert 370*2b15cb3dSCy SchubertDocumentation 371*2b15cb3dSCy Schubert 372*2b15cb3dSCy Schubert* Update html2man. Fix some tags in the .html files 373*2b15cb3dSCy Schubert* Distribute ntp-wait.html 374*2b15cb3dSCy Schubert 375*2b15cb3dSCy Schubert--- 376*2b15cb3dSCy SchubertNTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03) 377*2b15cb3dSCy Schubert 378*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 379*2b15cb3dSCy Schubert 380*2b15cb3dSCy SchubertSeverity: Medium 381*2b15cb3dSCy Schubert 382*2b15cb3dSCy SchubertThis is a recommended upgrade. 383*2b15cb3dSCy Schubert 384*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code 385*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 386*2b15cb3dSCy Schubertref-clock issues, and documentation revisions. 387*2b15cb3dSCy Schubert 388*2b15cb3dSCy SchubertPortability improvements in this release affect AIX, Atari FreeMiNT, 389*2b15cb3dSCy SchubertFreeBSD4, Linux and Microsoft Windows. 390*2b15cb3dSCy Schubert 391*2b15cb3dSCy SchubertNew features / changes in this release: 392*2b15cb3dSCy Schubert 393*2b15cb3dSCy SchubertBuild system 394*2b15cb3dSCy Schubert* Use lsb_release to get information about Linux distributions. 395*2b15cb3dSCy Schubert* 'test' is in /usr/bin (instead of /bin) on some systems. 396*2b15cb3dSCy Schubert* Basic sanity checks for the ChangeLog file. 397*2b15cb3dSCy Schubert* Source certain build files with ./filename for systems without . in PATH. 398*2b15cb3dSCy Schubert* IRIX portability fix. 399*2b15cb3dSCy Schubert* Use a single copy of the "libopts" code. 400*2b15cb3dSCy Schubert* autogen/libopts upgrade. 401*2b15cb3dSCy Schubert* configure.ac m4 quoting cleanup. 402*2b15cb3dSCy Schubert 403*2b15cb3dSCy Schubertntpd 404*2b15cb3dSCy Schubert* Do not bind to IN6_IFF_ANYCAST addresses. 405*2b15cb3dSCy Schubert* Log the reason for exiting under Windows. 406*2b15cb3dSCy Schubert* Multicast fixes for Windows. 407*2b15cb3dSCy Schubert* Interpolation fixes for Windows. 408*2b15cb3dSCy Schubert* IPv4 and IPv6 Multicast fixes. 409*2b15cb3dSCy Schubert* Manycast solicitation fixes and general repairs. 410*2b15cb3dSCy Schubert* JJY refclock cleanup. 411*2b15cb3dSCy Schubert* NMEA refclock improvements. 412*2b15cb3dSCy Schubert* Oncore debug message cleanup. 413*2b15cb3dSCy Schubert* Palisade refclock now builds under Linux. 414*2b15cb3dSCy Schubert* Give RAWDCF more baud rates. 415*2b15cb3dSCy Schubert* Support Truetime Satellite clocks under Windows. 416*2b15cb3dSCy Schubert* Support Arbiter 1093C Satellite clocks under Windows. 417*2b15cb3dSCy Schubert* Make sure that the "filegen" configuration command defaults to "enable". 418*2b15cb3dSCy Schubert* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver. 419*2b15cb3dSCy Schubert* Prohibit 'includefile' directive in remote configuration command. 420*2b15cb3dSCy Schubert* Fix 'nic' interface bindings. 421*2b15cb3dSCy Schubert* Fix the way we link with openssl if openssl is installed in the base 422*2b15cb3dSCy Schubert system. 423*2b15cb3dSCy Schubert 424*2b15cb3dSCy Schubertntp-keygen 425*2b15cb3dSCy Schubert* Fix -V coredump. 426*2b15cb3dSCy Schubert* OpenSSL version display cleanup. 427*2b15cb3dSCy Schubert 428*2b15cb3dSCy Schubertntpdc 429*2b15cb3dSCy Schubert* Many counters should be treated as unsigned. 430*2b15cb3dSCy Schubert 431*2b15cb3dSCy Schubertntpdate 432*2b15cb3dSCy Schubert* Do not ignore replies with equal receive and transmit timestamps. 433*2b15cb3dSCy Schubert 434*2b15cb3dSCy Schubertntpq 435*2b15cb3dSCy Schubert* libntpq warning cleanup. 436*2b15cb3dSCy Schubert 437*2b15cb3dSCy Schubertntpsnmpd 438*2b15cb3dSCy Schubert* Correct SNMP type for "precision" and "resolution". 439*2b15cb3dSCy Schubert* Update the MIB from the draft version to RFC-5907. 440*2b15cb3dSCy Schubert 441*2b15cb3dSCy Schubertsntp 442*2b15cb3dSCy Schubert* Display timezone offset when showing time for sntp in the local 443*2b15cb3dSCy Schubert timezone. 444*2b15cb3dSCy Schubert* Pay proper attention to RATE KoD packets. 445*2b15cb3dSCy Schubert* Fix a miscalculation of the offset. 446*2b15cb3dSCy Schubert* Properly parse empty lines in the key file. 447*2b15cb3dSCy Schubert* Logging cleanup. 448*2b15cb3dSCy Schubert* Use tv_usec correctly in set_time(). 449*2b15cb3dSCy Schubert* Documentation cleanup. 450*2b15cb3dSCy Schubert 451*2b15cb3dSCy Schubert--- 452*2b15cb3dSCy SchubertNTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08) 453*2b15cb3dSCy Schubert 454*2b15cb3dSCy SchubertFocus: Bug fixes and portability improvements 455*2b15cb3dSCy Schubert 456*2b15cb3dSCy SchubertSeverity: Medium 457*2b15cb3dSCy Schubert 458*2b15cb3dSCy SchubertThis is a recommended upgrade. 459*2b15cb3dSCy Schubert 460*2b15cb3dSCy SchubertThis release includes build infrastructure updates, code 461*2b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor 462*2b15cb3dSCy Schubertref-clock issues, improved KOD handling, OpenSSL related 463*2b15cb3dSCy Schubertupdates and documentation revisions. 464*2b15cb3dSCy Schubert 465*2b15cb3dSCy SchubertPortability improvements in this release affect Irix, Linux, 466*2b15cb3dSCy SchubertMac OS, Microsoft Windows, OpenBSD and QNX6 467*2b15cb3dSCy Schubert 468*2b15cb3dSCy SchubertNew features / changes in this release: 469*2b15cb3dSCy Schubert 470*2b15cb3dSCy Schubertntpd 471*2b15cb3dSCy Schubert* Range syntax for the trustedkey configuration directive 472*2b15cb3dSCy Schubert* Unified IPv4 and IPv6 restrict lists 473*2b15cb3dSCy Schubert 474*2b15cb3dSCy Schubertntpdate 475*2b15cb3dSCy Schubert* Rate limiting and KOD handling 476*2b15cb3dSCy Schubert 477*2b15cb3dSCy Schubertntpsnmpd 478*2b15cb3dSCy Schubert* default connection to net-snmpd via a unix-domain socket 479*2b15cb3dSCy Schubert* command-line 'socket name' option 480*2b15cb3dSCy Schubert 481*2b15cb3dSCy Schubertntpq / ntpdc 482*2b15cb3dSCy Schubert* support for the "passwd ..." syntax 483*2b15cb3dSCy Schubert* key-type specific password prompts 484*2b15cb3dSCy Schubert 485*2b15cb3dSCy Schubertsntp 486*2b15cb3dSCy Schubert* MD5 authentication of an ntpd 487*2b15cb3dSCy Schubert* Broadcast and crypto 488*2b15cb3dSCy Schubert* OpenSSL support 489*2b15cb3dSCy Schubert 490*2b15cb3dSCy Schubert--- 491*2b15cb3dSCy SchubertNTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09) 492*2b15cb3dSCy Schubert 493*2b15cb3dSCy SchubertFocus: Bug fixes, portability fixes, and documentation improvements 494*2b15cb3dSCy Schubert 495*2b15cb3dSCy SchubertSeverity: Medium 496*2b15cb3dSCy Schubert 497*2b15cb3dSCy SchubertThis is a recommended upgrade. 498*2b15cb3dSCy Schubert 499*2b15cb3dSCy Schubert--- 500*2b15cb3dSCy SchubertNTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 501*2b15cb3dSCy Schubert 502*2b15cb3dSCy SchubertFocus: enhancements and bug fixes. 503*2b15cb3dSCy Schubert 504*2b15cb3dSCy Schubert--- 505eb6d21b4SOllivier RobertNTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 506eb6d21b4SOllivier Robert 507eb6d21b4SOllivier RobertFocus: Security Fixes 508eb6d21b4SOllivier Robert 509eb6d21b4SOllivier RobertSeverity: HIGH 510eb6d21b4SOllivier Robert 511eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability: 512eb6d21b4SOllivier Robert 513eb6d21b4SOllivier Robert* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563. 514eb6d21b4SOllivier Robert 515eb6d21b4SOllivier Robert See http://support.ntp.org/security for more information. 516eb6d21b4SOllivier Robert 517eb6d21b4SOllivier Robert NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. 518eb6d21b4SOllivier Robert In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time 519eb6d21b4SOllivier Robert transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 520eb6d21b4SOllivier Robert request or a mode 7 error response from an address which is not listed 521eb6d21b4SOllivier Robert in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will 522eb6d21b4SOllivier Robert reply with a mode 7 error response (and log a message). In this case: 523eb6d21b4SOllivier Robert 524eb6d21b4SOllivier Robert * If an attacker spoofs the source address of ntpd host A in a 525eb6d21b4SOllivier Robert mode 7 response packet sent to ntpd host B, both A and B will 526eb6d21b4SOllivier Robert continuously send each other error responses, for as long as 527eb6d21b4SOllivier Robert those packets get through. 528eb6d21b4SOllivier Robert 529eb6d21b4SOllivier Robert * If an attacker spoofs an address of ntpd host A in a mode 7 530eb6d21b4SOllivier Robert response packet sent to ntpd host A, A will respond to itself 531eb6d21b4SOllivier Robert endlessly, consuming CPU and logging excessively. 532eb6d21b4SOllivier Robert 533eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Robin Park and Dmitri 534eb6d21b4SOllivier Robert Vinokurov of Alcatel-Lucent. 535eb6d21b4SOllivier Robert 536eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE. 537eb6d21b4SOllivier Robert 538eb6d21b4SOllivier Robert--- 539*2b15cb3dSCy Schubertntpd now syncs to refclocks right away. 540*2b15cb3dSCy Schubert 541*2b15cb3dSCy SchubertBackward-Incompatible changes: 542*2b15cb3dSCy Schubert 543*2b15cb3dSCy Schubertntpd no longer accepts '-v name' or '-V name' to define internal variables. 544*2b15cb3dSCy SchubertUse '--var name' or '--dvar name' instead. (Bug 817) 545*2b15cb3dSCy Schubert 546*2b15cb3dSCy Schubert--- 547eb6d21b4SOllivier RobertNTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04) 548eb6d21b4SOllivier Robert 549eb6d21b4SOllivier RobertFocus: Security and Bug Fixes 550eb6d21b4SOllivier Robert 551eb6d21b4SOllivier RobertSeverity: HIGH 552eb6d21b4SOllivier Robert 553eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability: 554eb6d21b4SOllivier Robert 555eb6d21b4SOllivier Robert* [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252 556eb6d21b4SOllivier Robert 557eb6d21b4SOllivier Robert See http://support.ntp.org/security for more information. 558eb6d21b4SOllivier Robert 559eb6d21b4SOllivier Robert If autokey is enabled (if ntp.conf contains a "crypto pw whatever" 560eb6d21b4SOllivier Robert line) then a carefully crafted packet sent to the machine will cause 561eb6d21b4SOllivier Robert a buffer overflow and possible execution of injected code, running 562eb6d21b4SOllivier Robert with the privileges of the ntpd process (often root). 563eb6d21b4SOllivier Robert 564eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Chris Ries of CMU. 565eb6d21b4SOllivier Robert 566eb6d21b4SOllivier RobertThis release fixes the following low-severity vulnerabilities: 567eb6d21b4SOllivier Robert 568eb6d21b4SOllivier Robert* [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159 569eb6d21b4SOllivier Robert Credit for finding this vulnerability goes to Geoff Keating of Apple. 570eb6d21b4SOllivier Robert 571eb6d21b4SOllivier Robert* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows 572eb6d21b4SOllivier Robert Credit for finding this issue goes to Dave Hart. 573eb6d21b4SOllivier Robert 574eb6d21b4SOllivier RobertThis release fixes a number of bugs and adds some improvements: 575eb6d21b4SOllivier Robert 576eb6d21b4SOllivier Robert* Improved logging 577eb6d21b4SOllivier Robert* Fix many compiler warnings 578eb6d21b4SOllivier Robert* Many fixes and improvements for Windows 579eb6d21b4SOllivier Robert* Adds support for AIX 6.1 580eb6d21b4SOllivier Robert* Resolves some issues under MacOS X and Solaris 581eb6d21b4SOllivier Robert 582eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE. 583eb6d21b4SOllivier Robert 584eb6d21b4SOllivier Robert--- 585eb6d21b4SOllivier RobertNTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07) 586eb6d21b4SOllivier Robert 587eb6d21b4SOllivier RobertFocus: Security Fix 588eb6d21b4SOllivier Robert 589eb6d21b4SOllivier RobertSeverity: Low 590eb6d21b4SOllivier Robert 591eb6d21b4SOllivier RobertThis release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting 592eb6d21b4SOllivier Robertthe OpenSSL library relating to the incorrect checking of the return 593eb6d21b4SOllivier Robertvalue of EVP_VerifyFinal function. 594eb6d21b4SOllivier Robert 595eb6d21b4SOllivier RobertCredit for finding this issue goes to the Google Security Team for 596eb6d21b4SOllivier Robertfinding the original issue with OpenSSL, and to ocert.org for finding 597eb6d21b4SOllivier Robertthe problem in NTP and telling us about it. 598eb6d21b4SOllivier Robert 599eb6d21b4SOllivier RobertThis is a recommended upgrade. 600eb6d21b4SOllivier Robert--- 601ea906c41SOllivier RobertNTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17) 602ea906c41SOllivier Robert 603ea906c41SOllivier RobertFocus: Minor Bugfixes 604ea906c41SOllivier Robert 605ea906c41SOllivier RobertThis release fixes a number of Windows-specific ntpd bugs and 606ea906c41SOllivier Robertplatform-independent ntpdate bugs. A logging bugfix has been applied 607ea906c41SOllivier Robertto the ONCORE driver. 608ea906c41SOllivier Robert 609ea906c41SOllivier RobertThe "dynamic" keyword and is now obsolete and deferred binding to local 610ea906c41SOllivier Robertinterfaces is the new default. The minimum time restriction for the 611ea906c41SOllivier Robertinterface update interval has been dropped. 612ea906c41SOllivier Robert 613ea906c41SOllivier RobertA number of minor build system and documentation fixes are included. 614ea906c41SOllivier Robert 615ea906c41SOllivier RobertThis is a recommended upgrade for Windows. 616ea906c41SOllivier Robert 617ea906c41SOllivier Robert--- 618ea906c41SOllivier RobertNTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10) 619ea906c41SOllivier Robert 620ea906c41SOllivier RobertFocus: Minor Bugfixes 621ea906c41SOllivier Robert 622ea906c41SOllivier RobertThis release updates certain copyright information, fixes several display 623ea906c41SOllivier Robertbugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor 624ea906c41SOllivier Robertshutdown in the parse refclock driver, removes some lint from the code, 625ea906c41SOllivier Robertstops accessing certain buffers immediately after they were freed, fixes 626ea906c41SOllivier Roberta problem with non-command-line specification of -6, and allows the loopback 627ea906c41SOllivier Robertinterface to share addresses with other interfaces. 628ea906c41SOllivier Robert 629ea906c41SOllivier Robert--- 630ea906c41SOllivier RobertNTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29) 631ea906c41SOllivier Robert 632ea906c41SOllivier RobertFocus: Minor Bugfixes 633ea906c41SOllivier Robert 634ea906c41SOllivier RobertThis release fixes a bug in Windows that made it difficult to 635ea906c41SOllivier Robertterminate ntpd under windows. 636ea906c41SOllivier RobertThis is a recommended upgrade for Windows. 637ea906c41SOllivier Robert 638ea906c41SOllivier Robert--- 639ea906c41SOllivier RobertNTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19) 640ea906c41SOllivier Robert 641ea906c41SOllivier RobertFocus: Minor Bugfixes 642ea906c41SOllivier Robert 643ea906c41SOllivier RobertThis release fixes a multicast mode authentication problem, 644ea906c41SOllivier Robertan error in NTP packet handling on Windows that could lead to 645ea906c41SOllivier Robertntpd crashing, and several other minor bugs. Handling of 646ea906c41SOllivier Robertmulticast interfaces and logging configuration were improved. 647ea906c41SOllivier RobertThe required versions of autogen and libopts were incremented. 648ea906c41SOllivier RobertThis is a recommended upgrade for Windows and multicast users. 649ea906c41SOllivier Robert 650ea906c41SOllivier Robert--- 651ea906c41SOllivier RobertNTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31) 652ea906c41SOllivier Robert 653ea906c41SOllivier RobertFocus: enhancements and bug fixes. 654ea906c41SOllivier Robert 655ea906c41SOllivier RobertDynamic interface rescanning was added to simplify the use of ntpd in 656ea906c41SOllivier Robertconjunction with DHCP. GNU AutoGen is used for its command-line options 657ea906c41SOllivier Robertprocessing. Separate PPS devices are supported for PARSE refclocks, MD5 658ea906c41SOllivier Robertsignatures are now provided for the release files. Drivers have been 659ea906c41SOllivier Robertadded for some new ref-clocks and have been removed for some older 660ea906c41SOllivier Robertref-clocks. This release also includes other improvements, documentation 661ea906c41SOllivier Robertand bug fixes. 662ea906c41SOllivier Robert 663ea906c41SOllivier RobertK&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 664ea906c41SOllivier RobertC support. 665ea906c41SOllivier Robert 666ea906c41SOllivier Robert--- 667ea906c41SOllivier RobertNTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15) 668ea906c41SOllivier Robert 669ea906c41SOllivier RobertFocus: enhancements and bug fixes. 670