xref: /freebsd/contrib/ntp/NEWS (revision a25439b68651d176ae05867f5090d45fd85e9f24)
12b15cb3dSCy Schubert---
2*a25439b6SCy SchubertNTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/xx)
3*a25439b6SCy Schubert
4*a25439b6SCy SchubertFocus: Security and Bug fixes, enhancements.
5*a25439b6SCy Schubert
6*a25439b6SCy SchubertSeverity: MEDIUM
7*a25439b6SCy Schubert
8*a25439b6SCy SchubertIn addition to bug fixes and enhancements, this release fixes the
9*a25439b6SCy Schubertfollowing medium-severity vulnerabilities involving private key
10*a25439b6SCy Schubertauthentication:
11*a25439b6SCy Schubert
12*a25439b6SCy Schubert* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
13*a25439b6SCy Schubert
14*a25439b6SCy Schubert    References: Sec 2779 / CVE-2015-1798 / VU#374268
15*a25439b6SCy Schubert    Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not
16*a25439b6SCy Schubert	including ntp-4.2.8p2 where the installation uses symmetric keys
17*a25439b6SCy Schubert	to authenticate remote associations.
18*a25439b6SCy Schubert    CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
19*a25439b6SCy Schubert    Date Resolved: Stable (4.2.8p2) 07 Apr 2015
20*a25439b6SCy Schubert    Summary: When ntpd is configured to use a symmetric key to authenticate
21*a25439b6SCy Schubert	a remote NTP server/peer, it checks if the NTP message
22*a25439b6SCy Schubert	authentication code (MAC) in received packets is valid, but not if
23*a25439b6SCy Schubert	there actually is any MAC included. Packets without a MAC are
24*a25439b6SCy Schubert	accepted as if they had a valid MAC. This allows a MITM attacker to
25*a25439b6SCy Schubert	send false packets that are accepted by the client/peer without
26*a25439b6SCy Schubert	having to know the symmetric key. The attacker needs to know the
27*a25439b6SCy Schubert	transmit timestamp of the client to match it in the forged reply
28*a25439b6SCy Schubert	and the false reply needs to reach the client before the genuine
29*a25439b6SCy Schubert	reply from the server. The attacker doesn't necessarily need to be
30*a25439b6SCy Schubert	relaying the packets between the client and the server.
31*a25439b6SCy Schubert
32*a25439b6SCy Schubert	Authentication using autokey doesn't have this problem as there is
33*a25439b6SCy Schubert	a check that requires the key ID to be larger than NTP_MAXKEY,
34*a25439b6SCy Schubert	which fails for packets without a MAC.
35*a25439b6SCy Schubert    Mitigation:
36*a25439b6SCy Schubert        Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
37*a25439b6SCy Schubert	or the NTP Public Services Project Download Page
38*a25439b6SCy Schubert        Configure ntpd with enough time sources and monitor it properly.
39*a25439b6SCy Schubert    Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
40*a25439b6SCy Schubert
41*a25439b6SCy Schubert* [Sec 2781] Authentication doesn't protect symmetric associations against
42*a25439b6SCy Schubert  DoS attacks.
43*a25439b6SCy Schubert
44*a25439b6SCy Schubert    References: Sec 2781 / CVE-2015-1799 / VU#374268
45*a25439b6SCy Schubert    Affects: All NTP releases starting with at least xntp3.3wy up to but
46*a25439b6SCy Schubert	not including ntp-4.2.8p2 where the installation uses symmetric
47*a25439b6SCy Schubert	key authentication.
48*a25439b6SCy Schubert    CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
49*a25439b6SCy Schubert    Note: the CVSS base Score for this issue could be 4.3 or lower, and
50*a25439b6SCy Schubert	it could be higher than 5.4.
51*a25439b6SCy Schubert    Date Resolved: Stable (4.2.8p2) 07 Apr 2015
52*a25439b6SCy Schubert    Summary: An attacker knowing that NTP hosts A and B are peering with
53*a25439b6SCy Schubert	each other (symmetric association) can send a packet to host A
54*a25439b6SCy Schubert	with source address of B which will set the NTP state variables
55*a25439b6SCy Schubert	on A to the values sent by the attacker. Host A will then send
56*a25439b6SCy Schubert	on its next poll to B a packet with originate timestamp that
57*a25439b6SCy Schubert	doesn't match the transmit timestamp of B and the packet will
58*a25439b6SCy Schubert	be dropped. If the attacker does this periodically for both
59*a25439b6SCy Schubert	hosts, they won't be able to synchronize to each other. This is
60*a25439b6SCy Schubert	a known denial-of-service attack, described at
61*a25439b6SCy Schubert	https://www.eecis.udel.edu/~mills/onwire.html .
62*a25439b6SCy Schubert
63*a25439b6SCy Schubert	According to the document the NTP authentication is supposed to
64*a25439b6SCy Schubert	protect symmetric associations against this attack, but that
65*a25439b6SCy Schubert	doesn't seem to be the case. The state variables are updated even
66*a25439b6SCy Schubert	when authentication fails and the peers are sending packets with
67*a25439b6SCy Schubert	originate timestamps that don't match the transmit timestamps on
68*a25439b6SCy Schubert	the receiving side.
69*a25439b6SCy Schubert
70*a25439b6SCy Schubert	This seems to be a very old problem, dating back to at least
71*a25439b6SCy Schubert	xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905)
72*a25439b6SCy Schubert	specifications, so other NTP implementations with support for
73*a25439b6SCy Schubert	symmetric associations and authentication may be vulnerable too.
74*a25439b6SCy Schubert	An update to the NTP RFC to correct this error is in-process.
75*a25439b6SCy Schubert    Mitigation:
76*a25439b6SCy Schubert        Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
77*a25439b6SCy Schubert	or the NTP Public Services Project Download Page
78*a25439b6SCy Schubert        Note that for users of autokey, this specific style of MITM attack
79*a25439b6SCy Schubert	is simply a long-known potential problem.
80*a25439b6SCy Schubert        Configure ntpd with appropriate time sources and monitor ntpd.
81*a25439b6SCy Schubert	Alert your staff if problems are detected.
82*a25439b6SCy Schubert    Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
83*a25439b6SCy Schubert
84*a25439b6SCy Schubert* New script: update-leap
85*a25439b6SCy SchubertThe update-leap script will verify and if necessary, update the
86*a25439b6SCy Schubertleap-second definition file.
87*a25439b6SCy SchubertIt requires the following commands in order to work:
88*a25439b6SCy Schubert
89*a25439b6SCy Schubert	wget logger tr sed shasum
90*a25439b6SCy Schubert
91*a25439b6SCy SchubertSome may choose to run this from cron.  It needs more portability testing.
92*a25439b6SCy Schubert
93*a25439b6SCy SchubertBug Fixes and Improvements:
94*a25439b6SCy Schubert
95*a25439b6SCy Schubert* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003.
96*a25439b6SCy Schubert* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument.
97*a25439b6SCy Schubert* [Bug 2346] "graceful termination" signals do not do peer cleanup.
98*a25439b6SCy Schubert* [Bug 2728] See if C99-style structure initialization works.
99*a25439b6SCy Schubert* [Bug 2747] Upgrade libevent to 2.1.5-beta.
100*a25439b6SCy Schubert* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. .
101*a25439b6SCy Schubert* [Bug 2751] jitter.h has stale copies of l_fp macros.
102*a25439b6SCy Schubert* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM.
103*a25439b6SCy Schubert* [Bug 2757] Quiet compiler warnings.
104*a25439b6SCy Schubert* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq.
105*a25439b6SCy Schubert* [Bug 2763] Allow different thresholds for forward and backward steps.
106*a25439b6SCy Schubert* [Bug 2766] ntp-keygen output files should not be world-readable.
107*a25439b6SCy Schubert* [Bug 2767] ntp-keygen -M should symlink to ntp.keys.
108*a25439b6SCy Schubert* [Bug 2771] nonvolatile value is documented in wrong units.
109*a25439b6SCy Schubert* [Bug 2773] Early leap announcement from Palisade/Thunderbolt
110*a25439b6SCy Schubert* [Bug 2774] Unreasonably verbose printout - leap pending/warning
111*a25439b6SCy Schubert* [Bug 2775] ntp-keygen.c fails to compile under Windows.
112*a25439b6SCy Schubert* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info.
113*a25439b6SCy Schubert  Removed non-ASCII characters from some copyright comments.
114*a25439b6SCy Schubert  Removed trailing whitespace.
115*a25439b6SCy Schubert  Updated definitions for Meinberg clocks from current Meinberg header files.
116*a25439b6SCy Schubert  Now use C99 fixed-width types and avoid non-ASCII characters in comments.
117*a25439b6SCy Schubert  Account for updated definitions pulled from Meinberg header files.
118*a25439b6SCy Schubert  Updated comments on Meinberg GPS receivers which are not only called GPS16x.
119*a25439b6SCy Schubert  Replaced some constant numbers by defines from ntp_calendar.h
120*a25439b6SCy Schubert  Modified creation of parse-specific variables for Meinberg devices
121*a25439b6SCy Schubert  in gps16x_message().
122*a25439b6SCy Schubert  Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates.
123*a25439b6SCy Schubert  Modified mbg_tm_str() which now expexts an additional parameter controlling
124*a25439b6SCy Schubert  if the time status shall be printed.
125*a25439b6SCy Schubert* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
126*a25439b6SCy Schubert* [Sec 2781] Authentication doesn't protect symmetric associations against
127*a25439b6SCy Schubert  DoS attacks.
128*a25439b6SCy Schubert* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE.
129*a25439b6SCy Schubert* [Bug 2789] Quiet compiler warnings from libevent.
130*a25439b6SCy Schubert* [Bug 2790] If ntpd sets the Windows MM timer highest resolution
131*a25439b6SCy Schubert  pause briefly before measuring system clock precision to yield
132*a25439b6SCy Schubert  correct results.
133*a25439b6SCy Schubert* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer.
134*a25439b6SCy Schubert* Use predefined function types for parse driver functions
135*a25439b6SCy Schubert  used to set up function pointers.
136*a25439b6SCy Schubert  Account for changed prototype of parse_inp_fnc_t functions.
137*a25439b6SCy Schubert  Cast parse conversion results to appropriate types to avoid
138*a25439b6SCy Schubert  compiler warnings.
139*a25439b6SCy Schubert  Let ioctl() for Windows accept a (void *) to avoid compiler warnings
140*a25439b6SCy Schubert  when called with pointers to different types.
141*a25439b6SCy Schubert
142*a25439b6SCy Schubert---
1432b15cb3dSCy SchubertNTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04)
1442b15cb3dSCy Schubert
1452b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements.
1462b15cb3dSCy Schubert
1472b15cb3dSCy SchubertSeverity: HIGH
1482b15cb3dSCy Schubert
1492b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the
1502b15cb3dSCy Schubertfollowing high-severity vulnerabilities:
1512b15cb3dSCy Schubert
1522b15cb3dSCy Schubert* vallen is not validated in several places in ntp_crypto.c, leading
1532b15cb3dSCy Schubert  to a potential information leak or possibly a crash
1542b15cb3dSCy Schubert
1552b15cb3dSCy Schubert    References: Sec 2671 / CVE-2014-9297 / VU#852879
1562b15cb3dSCy Schubert    Affects: All NTP4 releases before 4.2.8p1 that are running autokey.
1572b15cb3dSCy Schubert    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
1582b15cb3dSCy Schubert    Date Resolved: Stable (4.2.8p1) 04 Feb 2015
1592b15cb3dSCy Schubert    Summary: The vallen packet value is not validated in several code
1602b15cb3dSCy Schubert             paths in ntp_crypto.c which can lead to information leakage
1612b15cb3dSCy Schubert	     or perhaps a crash of the ntpd process.
1622b15cb3dSCy Schubert    Mitigation - any of:
1632b15cb3dSCy Schubert	Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
1642b15cb3dSCy Schubert		or the NTP Public Services Project Download Page.
1652b15cb3dSCy Schubert	Disable Autokey Authentication by removing, or commenting out,
1662b15cb3dSCy Schubert		all configuration directives beginning with the "crypto"
1672b15cb3dSCy Schubert		keyword in your ntp.conf file.
1682b15cb3dSCy Schubert    Credit: This vulnerability was discovered by Stephen Roettger of the
1692b15cb3dSCy Schubert    	Google Security Team, with additional cases found by Sebastian
1702b15cb3dSCy Schubert	Krahmer of the SUSE Security Team and Harlan Stenn of Network
1712b15cb3dSCy Schubert	Time Foundation.
1722b15cb3dSCy Schubert
1732b15cb3dSCy Schubert* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses
1742b15cb3dSCy Schubert  can be bypassed.
1752b15cb3dSCy Schubert
1762b15cb3dSCy Schubert    References: Sec 2672 / CVE-2014-9298 / VU#852879
1772b15cb3dSCy Schubert    Affects: All NTP4 releases before 4.2.8p1, under at least some
1782b15cb3dSCy Schubert	versions of MacOS and Linux. *BSD has not been seen to be vulnerable.
1792b15cb3dSCy Schubert    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9
1802b15cb3dSCy Schubert    Date Resolved: Stable (4.2.8p1) 04 Feb 2014
1812b15cb3dSCy Schubert    Summary: While available kernels will prevent 127.0.0.1 addresses
1822b15cb3dSCy Schubert	from "appearing" on non-localhost IPv4 interfaces, some kernels
1832b15cb3dSCy Schubert	do not offer the same protection for ::1 source addresses on
1842b15cb3dSCy Schubert	IPv6 interfaces. Since NTP's access control is based on source
1852b15cb3dSCy Schubert	address and localhost addresses generally have no restrictions,
1862b15cb3dSCy Schubert	an attacker can send malicious control and configuration packets
1872b15cb3dSCy Schubert	by spoofing ::1 addresses from the outside. Note Well: This is
1882b15cb3dSCy Schubert	not really a bug in NTP, it's a problem with some OSes. If you
1892b15cb3dSCy Schubert	have one of these OSes where ::1 can be spoofed, ALL ::1 -based
1902b15cb3dSCy Schubert	ACL restrictions on any application can be bypassed!
1912b15cb3dSCy Schubert    Mitigation:
1922b15cb3dSCy Schubert        Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
1932b15cb3dSCy Schubert	or the NTP Public Services Project Download Page
1942b15cb3dSCy Schubert        Install firewall rules to block packets claiming to come from
1952b15cb3dSCy Schubert	::1 from inappropriate network interfaces.
1962b15cb3dSCy Schubert    Credit: This vulnerability was discovered by Stephen Roettger of
1972b15cb3dSCy Schubert	the Google Security Team.
1982b15cb3dSCy Schubert
1992b15cb3dSCy SchubertAdditionally, over 30 bugfixes and improvements were made to the codebase.
2002b15cb3dSCy SchubertSee the ChangeLog for more information.
2012b15cb3dSCy Schubert
2022b15cb3dSCy Schubert---
2032b15cb3dSCy SchubertNTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
2042b15cb3dSCy Schubert
2052b15cb3dSCy SchubertFocus: Security and Bug fixes, enhancements.
2062b15cb3dSCy Schubert
2072b15cb3dSCy SchubertSeverity: HIGH
2082b15cb3dSCy Schubert
2092b15cb3dSCy SchubertIn addition to bug fixes and enhancements, this release fixes the
2102b15cb3dSCy Schubertfollowing high-severity vulnerabilities:
2112b15cb3dSCy Schubert
2122b15cb3dSCy Schubert************************** vv NOTE WELL vv *****************************
2132b15cb3dSCy Schubert
2142b15cb3dSCy SchubertThe vulnerabilities listed below can be significantly mitigated by
2152b15cb3dSCy Schubertfollowing the BCP of putting
2162b15cb3dSCy Schubert
2172b15cb3dSCy Schubert restrict default ... noquery
2182b15cb3dSCy Schubert
2192b15cb3dSCy Schubertin the ntp.conf file.  With the exception of:
2202b15cb3dSCy Schubert
2212b15cb3dSCy Schubert   receive(): missing return on error
2222b15cb3dSCy Schubert   References: Sec 2670 / CVE-2014-9296 / VU#852879
2232b15cb3dSCy Schubert
2242b15cb3dSCy Schubertbelow (which is a limited-risk vulnerability), none of the recent
2252b15cb3dSCy Schubertvulnerabilities listed below can be exploited if the source IP is
2262b15cb3dSCy Schubertrestricted from sending a 'query'-class packet by your ntp.conf file.
2272b15cb3dSCy Schubert
2282b15cb3dSCy Schubert************************** ^^ NOTE WELL ^^ *****************************
2292b15cb3dSCy Schubert
2302b15cb3dSCy Schubert* Weak default key in config_auth().
2312b15cb3dSCy Schubert
2322b15cb3dSCy Schubert  References: [Sec 2665] / CVE-2014-9293 / VU#852879
2332b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
2342b15cb3dSCy Schubert  Vulnerable Versions: all releases prior to 4.2.7p11
2352b15cb3dSCy Schubert  Date Resolved: 28 Jan 2010
2362b15cb3dSCy Schubert
2372b15cb3dSCy Schubert  Summary: If no 'auth' key is set in the configuration file, ntpd
2382b15cb3dSCy Schubert	would generate a random key on the fly.  There were two
2392b15cb3dSCy Schubert	problems with this: 1) the generated key was 31 bits in size,
2402b15cb3dSCy Schubert	and 2) it used the (now weak) ntp_random() function, which was
2412b15cb3dSCy Schubert	seeded with a 32-bit value and could only provide 32 bits of
2422b15cb3dSCy Schubert	entropy.  This was sufficient back in the late 1990s when the
2432b15cb3dSCy Schubert	code was written.  Not today.
2442b15cb3dSCy Schubert
2452b15cb3dSCy Schubert  Mitigation - any of:
2462b15cb3dSCy Schubert	- Upgrade to 4.2.7p11 or later.
2472b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
2482b15cb3dSCy Schubert
2492b15cb3dSCy Schubert  Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
2502b15cb3dSCy Schubert  	of the Google Security Team.
2512b15cb3dSCy Schubert
2522b15cb3dSCy Schubert* Non-cryptographic random number generator with weak seed used by
2532b15cb3dSCy Schubert  ntp-keygen to generate symmetric keys.
2542b15cb3dSCy Schubert
2552b15cb3dSCy Schubert  References: [Sec 2666] / CVE-2014-9294 / VU#852879
2562b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
2572b15cb3dSCy Schubert  Vulnerable Versions: All NTP4 releases before 4.2.7p230
2582b15cb3dSCy Schubert  Date Resolved: Dev (4.2.7p230) 01 Nov 2011
2592b15cb3dSCy Schubert
2602b15cb3dSCy Schubert  Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
2612b15cb3dSCy Schubert  	prepare a random number generator that was of good quality back
2622b15cb3dSCy Schubert	in the late 1990s. The random numbers produced was then used to
2632b15cb3dSCy Schubert	generate symmetric keys. In ntp-4.2.8 we use a current-technology
2642b15cb3dSCy Schubert	cryptographic random number generator, either RAND_bytes from
2652b15cb3dSCy Schubert	OpenSSL, or arc4random().
2662b15cb3dSCy Schubert
2672b15cb3dSCy Schubert  Mitigation - any of:
2682b15cb3dSCy Schubert  	- Upgrade to 4.2.7p230 or later.
2692b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
2702b15cb3dSCy Schubert
2712b15cb3dSCy Schubert  Credit:  This vulnerability was discovered in ntp-4.2.6 by
2722b15cb3dSCy Schubert  	Stephen Roettger of the Google Security Team.
2732b15cb3dSCy Schubert
2742b15cb3dSCy Schubert* Buffer overflow in crypto_recv()
2752b15cb3dSCy Schubert
2762b15cb3dSCy Schubert  References: Sec 2667 / CVE-2014-9295 / VU#852879
2772b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
2782b15cb3dSCy Schubert  Versions: All releases before 4.2.8
2792b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
2802b15cb3dSCy Schubert
2812b15cb3dSCy Schubert  Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
2822b15cb3dSCy Schubert  	file contains a 'crypto pw ...' directive) a remote attacker
2832b15cb3dSCy Schubert	can send a carefully crafted packet that can overflow a stack
2842b15cb3dSCy Schubert	buffer and potentially allow malicious code to be executed
2852b15cb3dSCy Schubert	with the privilege level of the ntpd process.
2862b15cb3dSCy Schubert
2872b15cb3dSCy Schubert  Mitigation - any of:
2882b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later, or
2892b15cb3dSCy Schubert	- Disable Autokey Authentication by removing, or commenting out,
2902b15cb3dSCy Schubert	  all configuration directives beginning with the crypto keyword
2912b15cb3dSCy Schubert	  in your ntp.conf file.
2922b15cb3dSCy Schubert
2932b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
2942b15cb3dSCy Schubert  	Google Security Team.
2952b15cb3dSCy Schubert
2962b15cb3dSCy Schubert* Buffer overflow in ctl_putdata()
2972b15cb3dSCy Schubert
2982b15cb3dSCy Schubert  References: Sec 2668 / CVE-2014-9295 / VU#852879
2992b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
3002b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
3012b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
3022b15cb3dSCy Schubert
3032b15cb3dSCy Schubert  Summary: A remote attacker can send a carefully crafted packet that
3042b15cb3dSCy Schubert  	can overflow a stack buffer and potentially allow malicious
3052b15cb3dSCy Schubert	code to be executed with the privilege level of the ntpd process.
3062b15cb3dSCy Schubert
3072b15cb3dSCy Schubert  Mitigation - any of:
3082b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later.
3092b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
3102b15cb3dSCy Schubert
3112b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
3122b15cb3dSCy Schubert  	Google Security Team.
3132b15cb3dSCy Schubert
3142b15cb3dSCy Schubert* Buffer overflow in configure()
3152b15cb3dSCy Schubert
3162b15cb3dSCy Schubert  References: Sec 2669 / CVE-2014-9295 / VU#852879
3172b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
3182b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
3192b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
3202b15cb3dSCy Schubert
3212b15cb3dSCy Schubert  Summary: A remote attacker can send a carefully crafted packet that
3222b15cb3dSCy Schubert	can overflow a stack buffer and potentially allow malicious
3232b15cb3dSCy Schubert	code to be executed with the privilege level of the ntpd process.
3242b15cb3dSCy Schubert
3252b15cb3dSCy Schubert  Mitigation - any of:
3262b15cb3dSCy Schubert  	- Upgrade to 4.2.8, or later.
3272b15cb3dSCy Schubert	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
3282b15cb3dSCy Schubert
3292b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
3302b15cb3dSCy Schubert	Google Security Team.
3312b15cb3dSCy Schubert
3322b15cb3dSCy Schubert* receive(): missing return on error
3332b15cb3dSCy Schubert
3342b15cb3dSCy Schubert  References: Sec 2670 / CVE-2014-9296 / VU#852879
3352b15cb3dSCy Schubert  CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
3362b15cb3dSCy Schubert  Versions: All NTP4 releases before 4.2.8
3372b15cb3dSCy Schubert  Date Resolved: Stable (4.2.8) 18 Dec 2014
3382b15cb3dSCy Schubert
3392b15cb3dSCy Schubert  Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
3402b15cb3dSCy Schubert  	the code path where an error was detected, which meant
3412b15cb3dSCy Schubert	processing did not stop when a specific rare error occurred.
3422b15cb3dSCy Schubert	We haven't found a way for this bug to affect system integrity.
3432b15cb3dSCy Schubert	If there is no way to affect system integrity the base CVSS
3442b15cb3dSCy Schubert	score for this bug is 0. If there is one avenue through which
3452b15cb3dSCy Schubert	system integrity can be partially affected, the base score
3462b15cb3dSCy Schubert	becomes a 5. If system integrity can be partially affected
3472b15cb3dSCy Schubert	via all three integrity metrics, the CVSS base score become 7.5.
3482b15cb3dSCy Schubert
3492b15cb3dSCy Schubert  Mitigation - any of:
3502b15cb3dSCy Schubert        - Upgrade to 4.2.8, or later,
3512b15cb3dSCy Schubert        - Remove or comment out all configuration directives
3522b15cb3dSCy Schubert	  beginning with the crypto keyword in your ntp.conf file.
3532b15cb3dSCy Schubert
3542b15cb3dSCy Schubert  Credit: This vulnerability was discovered by Stephen Roettger of the
3552b15cb3dSCy Schubert  	Google Security Team.
3562b15cb3dSCy Schubert
3572b15cb3dSCy SchubertSee http://support.ntp.org/security for more information.
3582b15cb3dSCy Schubert
3592b15cb3dSCy SchubertNew features / changes in this release:
3602b15cb3dSCy Schubert
3612b15cb3dSCy SchubertImportant Changes
3622b15cb3dSCy Schubert
3632b15cb3dSCy Schubert* Internal NTP Era counters
3642b15cb3dSCy Schubert
3652b15cb3dSCy SchubertThe internal counters that track the "era" (range of years) we are in
3662b15cb3dSCy Schubertrolls over every 136 years'.  The current "era" started at the stroke of
3672b15cb3dSCy Schubertmidnight on 1 Jan 1900, and ends just before the stroke of midnight on
3682b15cb3dSCy Schubert1 Jan 2036.
3692b15cb3dSCy SchubertIn the past, we have used the "midpoint" of the  range to decide which
3702b15cb3dSCy Schubertera we were in.  Given the longevity of some products, it became clear
3712b15cb3dSCy Schubertthat it would be more functional to "look back" less, and "look forward"
3722b15cb3dSCy Schubertmore.  We now compile a timestamp into the ntpd executable and when we
3732b15cb3dSCy Schubertget a timestamp we us the "built-on" to tell us what era we are in.
3742b15cb3dSCy SchubertThis check "looks back" 10 years, and "looks forward" 126 years.
3752b15cb3dSCy Schubert
3762b15cb3dSCy Schubert* ntpdc responses disabled by default
3772b15cb3dSCy Schubert
3782b15cb3dSCy SchubertDave Hart writes:
3792b15cb3dSCy Schubert
3802b15cb3dSCy SchubertFor a long time, ntpq and its mostly text-based mode 6 (control)
3812b15cb3dSCy Schubertprotocol have been preferred over ntpdc and its mode 7 (private
3822b15cb3dSCy Schubertrequest) protocol for runtime queries and configuration.  There has
3832b15cb3dSCy Schubertbeen a goal of deprecating ntpdc, previously held back by numerous
3842b15cb3dSCy Schubertcapabilities exposed by ntpdc with no ntpq equivalent.  I have been
3852b15cb3dSCy Schubertadding commands to ntpq to cover these cases, and I believe I've
3862b15cb3dSCy Schubertcovered them all, though I've not compared command-by-command
3872b15cb3dSCy Schubertrecently.
3882b15cb3dSCy Schubert
3892b15cb3dSCy SchubertAs I've said previously, the binary mode 7 protocol involves a lot of
3902b15cb3dSCy Schuberthand-rolled structure layout and byte-swapping code in both ntpd and
3912b15cb3dSCy Schubertntpdc which is hard to get right.  As ntpd grows and changes, the
3922b15cb3dSCy Schubertchanges are difficult to expose via ntpdc while maintaining forward
3932b15cb3dSCy Schubertand backward compatibility between ntpdc and ntpd.  In contrast,
3942b15cb3dSCy Schubertntpq's text-based, label=value approach involves more code reuse and
3952b15cb3dSCy Schubertallows compatible changes without extra work in most cases.
3962b15cb3dSCy Schubert
3972b15cb3dSCy SchubertMode 7 has always been defined as vendor/implementation-specific while
3982b15cb3dSCy Schubertmode 6 is described in RFC 1305 and intended to be open to interoperate
3992b15cb3dSCy Schubertwith other implementations.  There is an early draft of an updated
4002b15cb3dSCy Schubertmode 6 description that likely will join the other NTPv4 RFCs
4012b15cb3dSCy Schuberteventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01)
4022b15cb3dSCy Schubert
4032b15cb3dSCy SchubertFor these reasons, ntpd 4.2.7p230 by default disables processing of
4042b15cb3dSCy Schubertntpdc queries, reducing ntpd's attack surface and functionally
4052b15cb3dSCy Schubertdeprecating ntpdc.  If you are in the habit of using ntpdc for certain
4062b15cb3dSCy Schubertoperations, please try the ntpq equivalent.  If there's no equivalent,
4072b15cb3dSCy Schubertplease open a bug report at http://bugs.ntp.org./
4082b15cb3dSCy Schubert
4092b15cb3dSCy SchubertIn addition to the above, over 1100 issues have been resolved between
4102b15cb3dSCy Schubertthe 4.2.6 branch and 4.2.8.  The ChangeLog file in the distribution
4112b15cb3dSCy Schubertlists these.
4122b15cb3dSCy Schubert
4132b15cb3dSCy Schubert---
4142b15cb3dSCy SchubertNTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24)
4152b15cb3dSCy Schubert
4162b15cb3dSCy SchubertFocus: Bug fixes
4172b15cb3dSCy Schubert
4182b15cb3dSCy SchubertSeverity: Medium
4192b15cb3dSCy Schubert
4202b15cb3dSCy SchubertThis is a recommended upgrade.
4212b15cb3dSCy Schubert
4222b15cb3dSCy SchubertThis release updates sys_rootdisp and sys_jitter calculations to match the
4232b15cb3dSCy SchubertRFC specification, fixes a potential IPv6 address matching error for the
4242b15cb3dSCy Schubert"nic" and "interface" configuration directives, suppresses the creation of
4252b15cb3dSCy Schubertextraneous ephemeral associations for certain broadcastclient and
4262b15cb3dSCy Schubertmulticastclient configurations, cleans up some ntpq display issues, and
4272b15cb3dSCy Schubertincludes improvements to orphan mode, minor bugs fixes and code clean-ups.
4282b15cb3dSCy Schubert
4292b15cb3dSCy SchubertNew features / changes in this release:
4302b15cb3dSCy Schubert
4312b15cb3dSCy Schubertntpd
4322b15cb3dSCy Schubert
4332b15cb3dSCy Schubert * Updated "nic" and "interface" IPv6 address handling to prevent
4342b15cb3dSCy Schubert   mismatches with localhost [::1] and wildcard [::] which resulted from
4352b15cb3dSCy Schubert   using the address/prefix format (e.g. fe80::/64)
4362b15cb3dSCy Schubert * Fix orphan mode stratum incorrectly counting to infinity
4372b15cb3dSCy Schubert * Orphan parent selection metric updated to includes missing ntohl()
4382b15cb3dSCy Schubert * Non-printable stratum 16 refid no longer sent to ntp
4392b15cb3dSCy Schubert * Duplicate ephemeral associations suppressed for broadcastclient and
4402b15cb3dSCy Schubert   multicastclient without broadcastdelay
4412b15cb3dSCy Schubert * Exclude undetermined sys_refid from use in loopback TEST12
4422b15cb3dSCy Schubert * Exclude MODE_SERVER responses from KoD rate limiting
4432b15cb3dSCy Schubert * Include root delay in clock_update() sys_rootdisp calculations
4442b15cb3dSCy Schubert * get_systime() updated to exclude sys_residual offset (which only
4452b15cb3dSCy Schubert   affected bits "below" sys_tick, the precision threshold)
4462b15cb3dSCy Schubert * sys.peer jitter weighting corrected in sys_jitter calculation
4472b15cb3dSCy Schubert
4482b15cb3dSCy Schubertntpq
4492b15cb3dSCy Schubert
4502b15cb3dSCy Schubert * -n option extended to include the billboard "server" column
4512b15cb3dSCy Schubert * IPv6 addresses in the local column truncated to prevent overruns
4522b15cb3dSCy Schubert
4532b15cb3dSCy Schubert---
4542b15cb3dSCy SchubertNTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22)
4552b15cb3dSCy Schubert
4562b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
4572b15cb3dSCy Schubert
4582b15cb3dSCy SchubertSeverity: Medium
4592b15cb3dSCy Schubert
4602b15cb3dSCy SchubertThis is a recommended upgrade.
4612b15cb3dSCy Schubert
4622b15cb3dSCy SchubertThis release includes build infrastructure updates, code
4632b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
4642b15cb3dSCy Schubertref-clock issues, and documentation revisions.
4652b15cb3dSCy Schubert
4662b15cb3dSCy SchubertPortability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t.
4672b15cb3dSCy Schubert
4682b15cb3dSCy SchubertNew features / changes in this release:
4692b15cb3dSCy Schubert
4702b15cb3dSCy SchubertBuild system
4712b15cb3dSCy Schubert
4722b15cb3dSCy Schubert* Fix checking for struct rtattr
4732b15cb3dSCy Schubert* Update config.guess and config.sub for AIX
4742b15cb3dSCy Schubert* Upgrade required version of autogen and libopts for building
4752b15cb3dSCy Schubert  from our source code repository
4762b15cb3dSCy Schubert
4772b15cb3dSCy Schubertntpd
4782b15cb3dSCy Schubert
4792b15cb3dSCy Schubert* Back-ported several fixes for Coverity warnings from ntp-dev
4802b15cb3dSCy Schubert* Fix a rare boundary condition in UNLINK_EXPR_SLIST()
4812b15cb3dSCy Schubert* Allow "logconfig =allall" configuration directive
4822b15cb3dSCy Schubert* Bind tentative IPv6 addresses on Linux
4832b15cb3dSCy Schubert* Correct WWVB/Spectracom driver to timestamp CR instead of LF
4842b15cb3dSCy Schubert* Improved tally bit handling to prevent incorrect ntpq peer status reports
4852b15cb3dSCy Schubert* Exclude the Undisciplined Local Clock and ACTS drivers from the initial
4862b15cb3dSCy Schubert  candidate list unless they are designated a "prefer peer"
4872b15cb3dSCy Schubert* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for
4882b15cb3dSCy Schubert  selection during the 'tos orphanwait' period
4892b15cb3dSCy Schubert* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS
4902b15cb3dSCy Schubert  drivers
4912b15cb3dSCy Schubert* Improved support of the Parse Refclock trusttime flag in Meinberg mode
4922b15cb3dSCy Schubert* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero()
4932b15cb3dSCy Schubert* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline
4942b15cb3dSCy Schubert  clock slew on Microsoft Windows
4952b15cb3dSCy Schubert* Code cleanup in libntpq
4962b15cb3dSCy Schubert
4972b15cb3dSCy Schubertntpdc
4982b15cb3dSCy Schubert
4992b15cb3dSCy Schubert* Fix timerstats reporting
5002b15cb3dSCy Schubert
5012b15cb3dSCy Schubertntpdate
5022b15cb3dSCy Schubert
5032b15cb3dSCy Schubert* Reduce time required to set clock
5042b15cb3dSCy Schubert* Allow a timeout greater than 2 seconds
5052b15cb3dSCy Schubert
5062b15cb3dSCy Schubertsntp
5072b15cb3dSCy Schubert
5082b15cb3dSCy Schubert* Backward incompatible command-line option change:
5092b15cb3dSCy Schubert  -l/--filelog changed -l/--logfile (to be consistent with ntpd)
5102b15cb3dSCy Schubert
5112b15cb3dSCy SchubertDocumentation
5122b15cb3dSCy Schubert
5132b15cb3dSCy Schubert* Update html2man. Fix some tags in the .html files
5142b15cb3dSCy Schubert* Distribute ntp-wait.html
5152b15cb3dSCy Schubert
5162b15cb3dSCy Schubert---
5172b15cb3dSCy SchubertNTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03)
5182b15cb3dSCy Schubert
5192b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
5202b15cb3dSCy Schubert
5212b15cb3dSCy SchubertSeverity: Medium
5222b15cb3dSCy Schubert
5232b15cb3dSCy SchubertThis is a recommended upgrade.
5242b15cb3dSCy Schubert
5252b15cb3dSCy SchubertThis release includes build infrastructure updates, code
5262b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
5272b15cb3dSCy Schubertref-clock issues, and documentation revisions.
5282b15cb3dSCy Schubert
5292b15cb3dSCy SchubertPortability improvements in this release affect AIX, Atari FreeMiNT,
5302b15cb3dSCy SchubertFreeBSD4, Linux and Microsoft Windows.
5312b15cb3dSCy Schubert
5322b15cb3dSCy SchubertNew features / changes in this release:
5332b15cb3dSCy Schubert
5342b15cb3dSCy SchubertBuild system
5352b15cb3dSCy Schubert* Use lsb_release to get information about Linux distributions.
5362b15cb3dSCy Schubert* 'test' is in /usr/bin (instead of /bin) on some systems.
5372b15cb3dSCy Schubert* Basic sanity checks for the ChangeLog file.
5382b15cb3dSCy Schubert* Source certain build files with ./filename for systems without . in PATH.
5392b15cb3dSCy Schubert* IRIX portability fix.
5402b15cb3dSCy Schubert* Use a single copy of the "libopts" code.
5412b15cb3dSCy Schubert* autogen/libopts upgrade.
5422b15cb3dSCy Schubert* configure.ac m4 quoting cleanup.
5432b15cb3dSCy Schubert
5442b15cb3dSCy Schubertntpd
5452b15cb3dSCy Schubert* Do not bind to IN6_IFF_ANYCAST addresses.
5462b15cb3dSCy Schubert* Log the reason for exiting under Windows.
5472b15cb3dSCy Schubert* Multicast fixes for Windows.
5482b15cb3dSCy Schubert* Interpolation fixes for Windows.
5492b15cb3dSCy Schubert* IPv4 and IPv6 Multicast fixes.
5502b15cb3dSCy Schubert* Manycast solicitation fixes and general repairs.
5512b15cb3dSCy Schubert* JJY refclock cleanup.
5522b15cb3dSCy Schubert* NMEA refclock improvements.
5532b15cb3dSCy Schubert* Oncore debug message cleanup.
5542b15cb3dSCy Schubert* Palisade refclock now builds under Linux.
5552b15cb3dSCy Schubert* Give RAWDCF more baud rates.
5562b15cb3dSCy Schubert* Support Truetime Satellite clocks under Windows.
5572b15cb3dSCy Schubert* Support Arbiter 1093C Satellite clocks under Windows.
5582b15cb3dSCy Schubert* Make sure that the "filegen" configuration command defaults to "enable".
5592b15cb3dSCy Schubert* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver.
5602b15cb3dSCy Schubert* Prohibit 'includefile' directive in remote configuration command.
5612b15cb3dSCy Schubert* Fix 'nic' interface bindings.
5622b15cb3dSCy Schubert* Fix the way we link with openssl if openssl is installed in the base
5632b15cb3dSCy Schubert  system.
5642b15cb3dSCy Schubert
5652b15cb3dSCy Schubertntp-keygen
5662b15cb3dSCy Schubert* Fix -V coredump.
5672b15cb3dSCy Schubert* OpenSSL version display cleanup.
5682b15cb3dSCy Schubert
5692b15cb3dSCy Schubertntpdc
5702b15cb3dSCy Schubert* Many counters should be treated as unsigned.
5712b15cb3dSCy Schubert
5722b15cb3dSCy Schubertntpdate
5732b15cb3dSCy Schubert* Do not ignore replies with equal receive and transmit timestamps.
5742b15cb3dSCy Schubert
5752b15cb3dSCy Schubertntpq
5762b15cb3dSCy Schubert* libntpq warning cleanup.
5772b15cb3dSCy Schubert
5782b15cb3dSCy Schubertntpsnmpd
5792b15cb3dSCy Schubert* Correct SNMP type for "precision" and "resolution".
5802b15cb3dSCy Schubert* Update the MIB from the draft version to RFC-5907.
5812b15cb3dSCy Schubert
5822b15cb3dSCy Schubertsntp
5832b15cb3dSCy Schubert* Display timezone offset when showing time for sntp in the local
5842b15cb3dSCy Schubert  timezone.
5852b15cb3dSCy Schubert* Pay proper attention to RATE KoD packets.
5862b15cb3dSCy Schubert* Fix a miscalculation of the offset.
5872b15cb3dSCy Schubert* Properly parse empty lines in the key file.
5882b15cb3dSCy Schubert* Logging cleanup.
5892b15cb3dSCy Schubert* Use tv_usec correctly in set_time().
5902b15cb3dSCy Schubert* Documentation cleanup.
5912b15cb3dSCy Schubert
5922b15cb3dSCy Schubert---
5932b15cb3dSCy SchubertNTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08)
5942b15cb3dSCy Schubert
5952b15cb3dSCy SchubertFocus: Bug fixes and portability improvements
5962b15cb3dSCy Schubert
5972b15cb3dSCy SchubertSeverity: Medium
5982b15cb3dSCy Schubert
5992b15cb3dSCy SchubertThis is a recommended upgrade.
6002b15cb3dSCy Schubert
6012b15cb3dSCy SchubertThis release includes build infrastructure updates, code
6022b15cb3dSCy Schubertclean-ups, minor bug fixes, fixes for a number of minor
6032b15cb3dSCy Schubertref-clock issues, improved KOD handling, OpenSSL related
6042b15cb3dSCy Schubertupdates and documentation revisions.
6052b15cb3dSCy Schubert
6062b15cb3dSCy SchubertPortability improvements in this release affect Irix, Linux,
6072b15cb3dSCy SchubertMac OS, Microsoft Windows, OpenBSD and QNX6
6082b15cb3dSCy Schubert
6092b15cb3dSCy SchubertNew features / changes in this release:
6102b15cb3dSCy Schubert
6112b15cb3dSCy Schubertntpd
6122b15cb3dSCy Schubert* Range syntax for the trustedkey configuration directive
6132b15cb3dSCy Schubert* Unified IPv4 and IPv6 restrict lists
6142b15cb3dSCy Schubert
6152b15cb3dSCy Schubertntpdate
6162b15cb3dSCy Schubert* Rate limiting and KOD handling
6172b15cb3dSCy Schubert
6182b15cb3dSCy Schubertntpsnmpd
6192b15cb3dSCy Schubert* default connection to net-snmpd via a unix-domain socket
6202b15cb3dSCy Schubert* command-line 'socket name' option
6212b15cb3dSCy Schubert
6222b15cb3dSCy Schubertntpq / ntpdc
6232b15cb3dSCy Schubert* support for the "passwd ..." syntax
6242b15cb3dSCy Schubert* key-type specific password prompts
6252b15cb3dSCy Schubert
6262b15cb3dSCy Schubertsntp
6272b15cb3dSCy Schubert* MD5 authentication of an ntpd
6282b15cb3dSCy Schubert* Broadcast and crypto
6292b15cb3dSCy Schubert* OpenSSL support
6302b15cb3dSCy Schubert
6312b15cb3dSCy Schubert---
6322b15cb3dSCy SchubertNTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09)
6332b15cb3dSCy Schubert
6342b15cb3dSCy SchubertFocus: Bug fixes, portability fixes, and documentation improvements
6352b15cb3dSCy Schubert
6362b15cb3dSCy SchubertSeverity: Medium
6372b15cb3dSCy Schubert
6382b15cb3dSCy SchubertThis is a recommended upgrade.
6392b15cb3dSCy Schubert
6402b15cb3dSCy Schubert---
6412b15cb3dSCy SchubertNTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
6422b15cb3dSCy Schubert
6432b15cb3dSCy SchubertFocus: enhancements and bug fixes.
6442b15cb3dSCy Schubert
6452b15cb3dSCy Schubert---
646eb6d21b4SOllivier RobertNTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
647eb6d21b4SOllivier Robert
648eb6d21b4SOllivier RobertFocus: Security Fixes
649eb6d21b4SOllivier Robert
650eb6d21b4SOllivier RobertSeverity: HIGH
651eb6d21b4SOllivier Robert
652eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability:
653eb6d21b4SOllivier Robert
654eb6d21b4SOllivier Robert* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
655eb6d21b4SOllivier Robert
656eb6d21b4SOllivier Robert  See http://support.ntp.org/security for more information.
657eb6d21b4SOllivier Robert
658eb6d21b4SOllivier Robert  NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
659eb6d21b4SOllivier Robert  In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
660eb6d21b4SOllivier Robert  transfers use modes 1 through 5.  Upon receipt of an incorrect mode 7
661eb6d21b4SOllivier Robert  request or a mode 7 error response from an address which is not listed
662eb6d21b4SOllivier Robert  in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
663eb6d21b4SOllivier Robert  reply with a mode 7 error response (and log a message).  In this case:
664eb6d21b4SOllivier Robert
665eb6d21b4SOllivier Robert	* If an attacker spoofs the source address of ntpd host A in a
666eb6d21b4SOllivier Robert	  mode 7 response packet sent to ntpd host B, both A and B will
667eb6d21b4SOllivier Robert	  continuously send each other error responses, for as long as
668eb6d21b4SOllivier Robert	  those packets get through.
669eb6d21b4SOllivier Robert
670eb6d21b4SOllivier Robert	* If an attacker spoofs an address of ntpd host A in a mode 7
671eb6d21b4SOllivier Robert	  response packet sent to ntpd host A, A will respond to itself
672eb6d21b4SOllivier Robert	  endlessly, consuming CPU and logging excessively.
673eb6d21b4SOllivier Robert
674eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Robin Park and Dmitri
675eb6d21b4SOllivier Robert  Vinokurov of Alcatel-Lucent.
676eb6d21b4SOllivier Robert
677eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE.
678eb6d21b4SOllivier Robert
679eb6d21b4SOllivier Robert---
6802b15cb3dSCy Schubertntpd now syncs to refclocks right away.
6812b15cb3dSCy Schubert
6822b15cb3dSCy SchubertBackward-Incompatible changes:
6832b15cb3dSCy Schubert
6842b15cb3dSCy Schubertntpd no longer accepts '-v name' or '-V name' to define internal variables.
6852b15cb3dSCy SchubertUse '--var name' or '--dvar name' instead. (Bug 817)
6862b15cb3dSCy Schubert
6872b15cb3dSCy Schubert---
688eb6d21b4SOllivier RobertNTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
689eb6d21b4SOllivier Robert
690eb6d21b4SOllivier RobertFocus: Security and Bug Fixes
691eb6d21b4SOllivier Robert
692eb6d21b4SOllivier RobertSeverity: HIGH
693eb6d21b4SOllivier Robert
694eb6d21b4SOllivier RobertThis release fixes the following high-severity vulnerability:
695eb6d21b4SOllivier Robert
696eb6d21b4SOllivier Robert* [Sec 1151] Remote exploit if autokey is enabled.  CVE-2009-1252
697eb6d21b4SOllivier Robert
698eb6d21b4SOllivier Robert  See http://support.ntp.org/security for more information.
699eb6d21b4SOllivier Robert
700eb6d21b4SOllivier Robert  If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
701eb6d21b4SOllivier Robert  line) then a carefully crafted packet sent to the machine will cause
702eb6d21b4SOllivier Robert  a buffer overflow and possible execution of injected code, running
703eb6d21b4SOllivier Robert  with the privileges of the ntpd process (often root).
704eb6d21b4SOllivier Robert
705eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Chris Ries of CMU.
706eb6d21b4SOllivier Robert
707eb6d21b4SOllivier RobertThis release fixes the following low-severity vulnerabilities:
708eb6d21b4SOllivier Robert
709eb6d21b4SOllivier Robert* [Sec 1144] limited (two byte) buffer overflow in ntpq.  CVE-2009-0159
710eb6d21b4SOllivier Robert  Credit for finding this vulnerability goes to Geoff Keating of Apple.
711eb6d21b4SOllivier Robert
712eb6d21b4SOllivier Robert* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
713eb6d21b4SOllivier Robert  Credit for finding this issue goes to Dave Hart.
714eb6d21b4SOllivier Robert
715eb6d21b4SOllivier RobertThis release fixes a number of bugs and adds some improvements:
716eb6d21b4SOllivier Robert
717eb6d21b4SOllivier Robert* Improved logging
718eb6d21b4SOllivier Robert* Fix many compiler warnings
719eb6d21b4SOllivier Robert* Many fixes and improvements for Windows
720eb6d21b4SOllivier Robert* Adds support for AIX 6.1
721eb6d21b4SOllivier Robert* Resolves some issues under MacOS X and Solaris
722eb6d21b4SOllivier Robert
723eb6d21b4SOllivier RobertTHIS IS A STRONGLY RECOMMENDED UPGRADE.
724eb6d21b4SOllivier Robert
725eb6d21b4SOllivier Robert---
726eb6d21b4SOllivier RobertNTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
727eb6d21b4SOllivier Robert
728eb6d21b4SOllivier RobertFocus: Security Fix
729eb6d21b4SOllivier Robert
730eb6d21b4SOllivier RobertSeverity: Low
731eb6d21b4SOllivier Robert
732eb6d21b4SOllivier RobertThis release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
733eb6d21b4SOllivier Robertthe OpenSSL library relating to the incorrect checking of the return
734eb6d21b4SOllivier Robertvalue of EVP_VerifyFinal function.
735eb6d21b4SOllivier Robert
736eb6d21b4SOllivier RobertCredit for finding this issue goes to the Google Security Team for
737eb6d21b4SOllivier Robertfinding the original issue with OpenSSL, and to ocert.org for finding
738eb6d21b4SOllivier Robertthe problem in NTP and telling us about it.
739eb6d21b4SOllivier Robert
740eb6d21b4SOllivier RobertThis is a recommended upgrade.
741eb6d21b4SOllivier Robert---
742ea906c41SOllivier RobertNTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
743ea906c41SOllivier Robert
744ea906c41SOllivier RobertFocus: Minor Bugfixes
745ea906c41SOllivier Robert
746ea906c41SOllivier RobertThis release fixes a number of Windows-specific ntpd bugs and
747ea906c41SOllivier Robertplatform-independent ntpdate bugs. A logging bugfix has been applied
748ea906c41SOllivier Robertto the ONCORE driver.
749ea906c41SOllivier Robert
750ea906c41SOllivier RobertThe "dynamic" keyword and is now obsolete and deferred binding to local
751ea906c41SOllivier Robertinterfaces is the new default. The minimum time restriction for the
752ea906c41SOllivier Robertinterface update interval has been dropped.
753ea906c41SOllivier Robert
754ea906c41SOllivier RobertA number of minor build system and documentation fixes are included.
755ea906c41SOllivier Robert
756ea906c41SOllivier RobertThis is a recommended upgrade for Windows.
757ea906c41SOllivier Robert
758ea906c41SOllivier Robert---
759ea906c41SOllivier RobertNTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
760ea906c41SOllivier Robert
761ea906c41SOllivier RobertFocus: Minor Bugfixes
762ea906c41SOllivier Robert
763ea906c41SOllivier RobertThis release updates certain copyright information, fixes several display
764ea906c41SOllivier Robertbugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
765ea906c41SOllivier Robertshutdown in the parse refclock driver, removes some lint from the code,
766ea906c41SOllivier Robertstops accessing certain buffers immediately after they were freed, fixes
767ea906c41SOllivier Roberta problem with non-command-line specification of -6, and allows the loopback
768ea906c41SOllivier Robertinterface to share addresses with other interfaces.
769ea906c41SOllivier Robert
770ea906c41SOllivier Robert---
771ea906c41SOllivier RobertNTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
772ea906c41SOllivier Robert
773ea906c41SOllivier RobertFocus: Minor Bugfixes
774ea906c41SOllivier Robert
775ea906c41SOllivier RobertThis release fixes a bug in Windows that made it difficult to
776ea906c41SOllivier Robertterminate ntpd under windows.
777ea906c41SOllivier RobertThis is a recommended upgrade for Windows.
778ea906c41SOllivier Robert
779ea906c41SOllivier Robert---
780ea906c41SOllivier RobertNTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
781ea906c41SOllivier Robert
782ea906c41SOllivier RobertFocus: Minor Bugfixes
783ea906c41SOllivier Robert
784ea906c41SOllivier RobertThis release fixes a multicast mode authentication problem,
785ea906c41SOllivier Robertan error in NTP packet handling on Windows that could lead to
786ea906c41SOllivier Robertntpd crashing, and several other minor bugs. Handling of
787ea906c41SOllivier Robertmulticast interfaces and logging configuration were improved.
788ea906c41SOllivier RobertThe required versions of autogen and libopts were incremented.
789ea906c41SOllivier RobertThis is a recommended upgrade for Windows and multicast users.
790ea906c41SOllivier Robert
791ea906c41SOllivier Robert---
792ea906c41SOllivier RobertNTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
793ea906c41SOllivier Robert
794ea906c41SOllivier RobertFocus: enhancements and bug fixes.
795ea906c41SOllivier Robert
796ea906c41SOllivier RobertDynamic interface rescanning was added to simplify the use of ntpd in
797ea906c41SOllivier Robertconjunction with DHCP. GNU AutoGen is used for its command-line options
798ea906c41SOllivier Robertprocessing. Separate PPS devices are supported for PARSE refclocks, MD5
799ea906c41SOllivier Robertsignatures are now provided for the release files. Drivers have been
800ea906c41SOllivier Robertadded for some new ref-clocks and have been removed for some older
801ea906c41SOllivier Robertref-clocks. This release also includes other improvements, documentation
802ea906c41SOllivier Robertand bug fixes.
803ea906c41SOllivier Robert
804ea906c41SOllivier RobertK&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI
805ea906c41SOllivier RobertC support.
806ea906c41SOllivier Robert
807ea906c41SOllivier Robert---
808ea906c41SOllivier RobertNTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
809ea906c41SOllivier Robert
810ea906c41SOllivier RobertFocus: enhancements and bug fixes.
811