1--- 2NTP 4.2.8p4 3 4Focus: Security, Bug fies, enhancements. 5 6Severity: MEDIUM 7 8In addition to bug fixes and enhancements, this release fixes the 9following 13 low- and medium-severity vulnerabilities: 10 11* Incomplete vallen (value length) checks in ntp_crypto.c, leading 12 to potential crashes or potential code injection/information leakage. 13 14 References: Sec 2899, Sec 2671, CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 15 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 16 and 4.3.0 up to, but not including 4.3.77 17 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6 18 Summary: The fix for CVE-2014-9750 was incomplete in that there were 19 certain code paths where a packet with particular autokey operations 20 that contained malicious data was not always being completely 21 validated. Receipt of these packets can cause ntpd to crash. 22 Mitigation: 23 Don't use autokey. 24 Upgrade to 4.2.8p4, or later, from the NTP Project Download 25 Page or the NTP Public Services Project Download Page 26 Monitor your ntpd instances. 27 Credit: This weakness was discovered by Tenable Network Security. 28 29* Clients that receive a KoD should validate the origin timestamp field. 30 31 References: Sec 2901 / CVE-2015-7704, CVE-2015-7705 32 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 33 and 4.3.0 up to, but not including 4.3.77 34 CVSS: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3-5.0 at worst 35 Summary: An ntpd client that honors Kiss-of-Death responses will honor 36 KoD messages that have been forged by an attacker, causing it to 37 delay or stop querying its servers for time updates. Also, an 38 attacker can forge packets that claim to be from the target and 39 send them to servers often enough that a server that implements 40 KoD rate limiting will send the target machine a KoD response to 41 attempt to reduce the rate of incoming packets, or it may also 42 trigger a firewall block at the server for packets from the target 43 machine. For either of these attacks to succeed, the attacker must 44 know what servers the target is communicating with. An attacker 45 can be anywhere on the Internet and can frequently learn the 46 identity of the target's time source by sending the target a 47 time query. 48 Mitigation: 49 Implement BCP-38. 50 Upgrade to 4.2.8p4, or later, from the NTP Project Download Page 51 or the NTP Public Services Project Download Page 52 If you can't upgrade, restrict who can query ntpd to learn who 53 its servers are, and what IPs are allowed to ask your system 54 for the time. This mitigation is heavy-handed. 55 Monitor your ntpd instances. 56 Note: 57 4.2.8p4 protects against the first attack. For the second attack, 58 all we can do is warn when it is happening, which we do in 4.2.8p4. 59 Credit: This weakness was discovered by Aanchal Malhotra, 60 Issac E. Cohen, and Sharon Goldberg of Boston University. 61 62* configuration directives to change "pidfile" and "driftfile" should 63 only be allowed locally. 64 65 References: Sec 2902 / CVE-2015-5196 66 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 67 and 4.3.0 up to, but not including 4.3.77 68 CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.2 worst case 69 Summary: If ntpd is configured to allow for remote configuration, 70 and if the (possibly spoofed) source IP address is allowed to 71 send remote configuration requests, and if the attacker knows 72 the remote configuration password, it's possible for an attacker 73 to use the "pidfile" or "driftfile" directives to potentially 74 overwrite other files. 75 Mitigation: 76 Implement BCP-38. 77 Upgrade to 4.2.8p4, or later, from the NTP Project Download 78 Page or the NTP Public Services Project Download Page 79 If you cannot upgrade, don't enable remote configuration. 80 If you must enable remote configuration and cannot upgrade, 81 remote configuration of NTF's ntpd requires: 82 - an explicitly configured trustedkey, and you should also 83 configure a controlkey. 84 - access from a permitted IP. You choose the IPs. 85 - authentication. Don't disable it. Practice secure key safety. 86 Monitor your ntpd instances. 87 Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 88 89* Slow memory leak in CRYPTO_ASSOC 90 91 References: Sec 2909 / CVE-2015-7701 92 Affects: All ntp-4 releases that use autokey up to, but not 93 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 94 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 0.0 best/usual case, 95 4.6 otherwise 96 Summary: If ntpd is configured to use autokey, then an attacker can 97 send packets to ntpd that will, after several days of ongoing 98 attack, cause it to run out of memory. 99 Mitigation: 100 Don't use autokey. 101 Upgrade to 4.2.8p4, or later, from the NTP Project Download 102 Page or the NTP Public Services Project Download Page 103 Monitor your ntpd instances. 104 Credit: This weakness was discovered by Tenable Network Security. 105 106* mode 7 loop counter underrun 107 108 References: Sec 2913 / CVE-2015-7848 / TALOS-CAN-0052 109 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 110 and 4.3.0 up to, but not including 4.3.77 111 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6 112 Summary: If ntpd is configured to enable mode 7 packets, and if the 113 use of mode 7 packets is not properly protected thru the use of 114 the available mode 7 authentication and restriction mechanisms, 115 and if the (possibly spoofed) source IP address is allowed to 116 send mode 7 queries, then an attacker can send a crafted packet 117 to ntpd that will cause it to crash. 118 Mitigation: 119 Implement BCP-38. 120 Upgrade to 4.2.8p4, or later, from the NTP Project Download 121 Page or the NTP Public Services Project Download Page. 122 If you are unable to upgrade: 123 In ntp-4.2.8, mode 7 is disabled by default. Don't enable it. 124 If you must enable mode 7: 125 configure the use of a requestkey to control who can issue 126 mode 7 requests. 127 configure restrict noquery to further limit mode 7 requests 128 to trusted sources. 129 Monitor your ntpd instances. 130Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos. 131 132* memory corruption in password store 133 134 References: Sec 2916 / CVE-2015-7849 / TALOS-CAN-0054 135 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 136 CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.8, worst case 137 Summary: If ntpd is configured to allow remote configuration, and if 138 the (possibly spoofed) source IP address is allowed to send 139 remote configuration requests, and if the attacker knows the 140 remote configuration password or if ntpd was configured to 141 disable authentication, then an attacker can send a set of 142 packets to ntpd that may cause a crash or theoretically 143 perform a code injection attack. 144 Mitigation: 145 Implement BCP-38. 146 Upgrade to 4.2.8p4, or later, from the NTP Project Download 147 Page or the NTP Public Services Project Download Page. 148 If you are unable to upgrade, remote configuration of NTF's 149 ntpd requires: 150 an explicitly configured "trusted" key. Only configure 151 this if you need it. 152 access from a permitted IP address. You choose the IPs. 153 authentication. Don't disable it. Practice secure key safety. 154 Monitor your ntpd instances. 155 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 156 157* Infinite loop if extended logging enabled and the logfile and 158 keyfile are the same. 159 160 References: Sec 2917 / CVE-2015-7850 / TALOS-CAN-0055 161 Affects: All ntp-4 releases up to, but not including 4.2.8p4, 162 and 4.3.0 up to, but not including 4.3.77 163 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case 164 Summary: If ntpd is configured to allow remote configuration, and if 165 the (possibly spoofed) source IP address is allowed to send 166 remote configuration requests, and if the attacker knows the 167 remote configuration password or if ntpd was configured to 168 disable authentication, then an attacker can send a set of 169 packets to ntpd that will cause it to crash and/or create a 170 potentially huge log file. Specifically, the attacker could 171 enable extended logging, point the key file at the log file, 172 and cause what amounts to an infinite loop. 173 Mitigation: 174 Implement BCP-38. 175 Upgrade to 4.2.8p4, or later, from the NTP Project Download 176 Page or the NTP Public Services Project Download Page. 177 If you are unable to upgrade, remote configuration of NTF's ntpd 178 requires: 179 an explicitly configured "trusted" key. Only configure this 180 if you need it. 181 access from a permitted IP address. You choose the IPs. 182 authentication. Don't disable it. Practice secure key safety. 183 Monitor your ntpd instances. 184 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 185 186* Potential path traversal vulnerability in the config file saving of 187 ntpd on VMS. 188 189 References: Sec 2918 / CVE-2015-7851 / TALOS-CAN-0062 190 Affects: All ntp-4 releases running under VMS up to, but not 191 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 192 CVSS: (AV:N/AC:H/Au:M/C:N/I:P/A:C) Base Score: 5.2, worst case 193 Summary: If ntpd is configured to allow remote configuration, and if 194 the (possibly spoofed) IP address is allowed to send remote 195 configuration requests, and if the attacker knows the remote 196 configuration password or if ntpd was configured to disable 197 authentication, then an attacker can send a set of packets to 198 ntpd that may cause ntpd to overwrite files. 199 Mitigation: 200 Implement BCP-38. 201 Upgrade to 4.2.8p4, or later, from the NTP Project Download 202 Page or the NTP Public Services Project Download Page. 203 If you are unable to upgrade, remote configuration of NTF's ntpd 204 requires: 205 an explicitly configured "trusted" key. Only configure 206 this if you need it. 207 access from permitted IP addresses. You choose the IPs. 208 authentication. Don't disable it. Practice key security safety. 209 Monitor your ntpd instances. 210 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 211 212* ntpq atoascii() potential memory corruption 213 214 References: Sec 2919 / CVE-2015-7852 / TALOS-CAN-0063 215 Affects: All ntp-4 releases running up to, but not including 4.2.8p4, 216 and 4.3.0 up to, but not including 4.3.77 217 CVSS: (AV:N/AC:H/Au:N/C:N/I:P/A:P) Base Score: 4.0, worst case 218 Summary: If an attacker can figure out the precise moment that ntpq 219 is listening for data and the port number it is listening on or 220 if the attacker can provide a malicious instance ntpd that 221 victims will connect to then an attacker can send a set of 222 crafted mode 6 response packets that, if received by ntpq, 223 can cause ntpq to crash. 224 Mitigation: 225 Implement BCP-38. 226 Upgrade to 4.2.8p4, or later, from the NTP Project Download 227 Page or the NTP Public Services Project Download Page. 228 If you are unable to upgrade and you run ntpq against a server 229 and ntpq crashes, try again using raw mode. Build or get a 230 patched ntpq and see if that fixes the problem. Report new 231 bugs in ntpq or abusive servers appropriately. 232 If you use ntpq in scripts, make sure ntpq does what you expect 233 in your scripts. 234 Credit: This weakness was discovered by Yves Younan and 235 Aleksander Nikolich of Cisco Talos. 236 237* Invalid length data provided by a custom refclock driver could cause 238 a buffer overflow. 239 240 References: Sec 2920 / CVE-2015-7853 / TALOS-CAN-0064 241 Affects: Potentially all ntp-4 releases running up to, but not 242 including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77 243 that have custom refclocks 244 CVSS: (AV:L/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 usual case, 245 5.9 unusual worst case 246 Summary: A negative value for the datalen parameter will overflow a 247 data buffer. NTF's ntpd driver implementations always set this 248 value to 0 and are therefore not vulnerable to this weakness. 249 If you are running a custom refclock driver in ntpd and that 250 driver supplies a negative value for datalen (no custom driver 251 of even minimal competence would do this) then ntpd would 252 overflow a data buffer. It is even hypothetically possible 253 in this case that instead of simply crashing ntpd the attacker 254 could effect a code injection attack. 255 Mitigation: 256 Upgrade to 4.2.8p4, or later, from the NTP Project Download 257 Page or the NTP Public Services Project Download Page. 258 If you are unable to upgrade: 259 If you are running custom refclock drivers, make sure 260 the signed datalen value is either zero or positive. 261 Monitor your ntpd instances. 262 Credit: This weakness was discovered by Yves Younan of Cisco Talos. 263 264* Password Length Memory Corruption Vulnerability 265 266 References: Sec 2921 / CVE-2015-7854 / TALOS-CAN-0065 267 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 268 4.3.0 up to, but not including 4.3.77 269 CVSS: (AV:N/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 best case, 270 1.7 usual case, 6.8, worst case 271 Summary: If ntpd is configured to allow remote configuration, and if 272 the (possibly spoofed) source IP address is allowed to send 273 remote configuration requests, and if the attacker knows the 274 remote configuration password or if ntpd was (foolishly) 275 configured to disable authentication, then an attacker can 276 send a set of packets to ntpd that may cause it to crash, 277 with the hypothetical possibility of a small code injection. 278 Mitigation: 279 Implement BCP-38. 280 Upgrade to 4.2.8p4, or later, from the NTP Project Download 281 Page or the NTP Public Services Project Download Page. 282 If you are unable to upgrade, remote configuration of NTF's 283 ntpd requires: 284 an explicitly configured "trusted" key. Only configure 285 this if you need it. 286 access from a permitted IP address. You choose the IPs. 287 authentication. Don't disable it. Practice secure key safety. 288 Monitor your ntpd instances. 289 Credit: This weakness was discovered by Yves Younan and 290 Aleksander Nikolich of Cisco Talos. 291 292* decodenetnum() will ASSERT botch instead of returning FAIL on some 293 bogus values. 294 295 References: Sec 2922 / CVE-2015-7855 296 Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 297 4.3.0 up to, but not including 4.3.77 298 CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case 299 Summary: If ntpd is fed a crafted mode 6 or mode 7 packet containing 300 an unusually long data value where a network address is expected, 301 the decodenetnum() function will abort with an assertion failure 302 instead of simply returning a failure condition. 303 Mitigation: 304 Implement BCP-38. 305 Upgrade to 4.2.8p4, or later, from the NTP Project Download 306 Page or the NTP Public Services Project Download Page. 307 If you are unable to upgrade: 308 mode 7 is disabled by default. Don't enable it. 309 Use restrict noquery to limit who can send mode 6 310 and mode 7 requests. 311 Configure and use the controlkey and requestkey 312 authentication directives to limit who can 313 send mode 6 and mode 7 requests. 314 Monitor your ntpd instances. 315 Credit: This weakness was discovered by John D "Doug" Birdwell of IDA.org. 316 317* NAK to the Future: Symmetric association authentication bypass via 318 crypto-NAK. 319 320 References: Sec 2941 / CVE-2015-7871 321 Affects: All ntp-4 releases between 4.2.5p186 up to but not including 322 4.2.8p4, and 4.3.0 up to but not including 4.3.77 323 CVSS: (AV:N/AC:L/Au:N/C:N/I:P/A:P) Base Score: 6.4 324 Summary: Crypto-NAK packets can be used to cause ntpd to accept time 325 from unauthenticated ephemeral symmetric peers by bypassing the 326 authentication required to mobilize peer associations. This 327 vulnerability appears to have been introduced in ntp-4.2.5p186 328 when the code handling mobilization of new passive symmetric 329 associations (lines 1103-1165) was refactored. 330 Mitigation: 331 Implement BCP-38. 332 Upgrade to 4.2.8p4, or later, from the NTP Project Download 333 Page or the NTP Public Services Project Download Page. 334 If you are unable to upgrade: 335 Apply the patch to the bottom of the "authentic" check 336 block around line 1136 of ntp_proto.c. 337 Monitor your ntpd instances. 338 Credit: This weakness was discovered by Stephen Gray <stepgray@cisco.com>. 339 340Backward-Incompatible changes: 341* [Bug 2817] Default on Linux is now "rlimit memlock -1". 342While the general default of 32M is still the case, under Linux 343the default value has been changed to -1 (do not lock ntpd into 344 memory). A value of 0 means "lock ntpd into memory with whatever 345 memory it needs." If your ntp.conf file has an explicit "rlimit memlock" 346 value in it, that value will continue to be used. 347 348* [Bug 2886] Misspelling: "outlyer" should be "outlier". 349 If you've written a script that looks for this case in, say, the 350 output of ntpq, you probably want to change your regex matches 351 from 'outlyer' to 'outl[iy]er'. 352 353New features in this release: 354* 'rlimit memlock' now has finer-grained control. A value of -1 means 355 "don't lock ntpd into memore". This is the default for Linux boxes. 356 A value of 0 means "lock ntpd into memory" with no limits. Otherwise 357 the value is the number of megabytes of memory to lock. The default 358 is 32 megabytes. 359 360* The old Google Test framework has been replaced with a new framework, 361 based on http://www.throwtheswitch.org/unity/ . 362 363Bug Fixes and Improvements: 364* [Bug 2332] (reopened) Exercise thread cancellation once before dropping 365 privileges and limiting resources in NTPD removes the need to link 366 forcefully against 'libgcc_s' which does not always work. J.Perlinger 367* [Bug 2595] ntpdate man page quirks. Hal Murray, Harlan Stenn. 368* [Bug 2625] Deprecate flag1 in local refclock. Hal Murray, Harlan Stenn. 369* [Bug 2817] Stop locking ntpd into memory by default under Linux. H.Stenn. 370* [Bug 2821] minor build issues: fixed refclock_gpsdjson.c. perlinger@ntp.org 371* [Bug 2823] ntpsweep with recursive peers option doesn't work. H.Stenn. 372* [Bug 2849] Systems with more than one default route may never 373 synchronize. Brian Utterback. Note that this patch might need to 374 be reverted once Bug 2043 has been fixed. 375* [Bug 2864] 4.2.8p3 fails to compile on Windows. Juergen Perlinger 376* [Bug 2866] segmentation fault at initgroups(). Harlan Stenn. 377* [Bug 2867] ntpd with autokey active crashed by 'ntpq -crv'. J.Perlinger 378* [Bug 2873] libevent should not include .deps/ in the tarball. H.Stenn 379* [Bug 2874] Don't distribute generated sntp/tests/fileHandlingTest.h. H.Stenn 380* [Bug 2875] sntp/Makefile.am: Get rid of DIST_SUBDIRS. libevent must 381 be configured for the distribution targets. Harlan Stenn. 382* [Bug 2883] ntpd crashes on exit with empty driftfile. Miroslav Lichvar. 383* [Bug 2886] Mis-spelling: "outlyer" should be "outlier". dave@horsfall.org 384* [Bug 2888] streamline calendar functions. perlinger@ntp.org 385* [Bug 2889] ntp-dev-4.3.67 does not build on Windows. perlinger@ntp.org 386* [Bug 2890] Ignore ENOBUFS on routing netlink socket. Konstantin Khlebnikov. 387* [Bug 2906] make check needs better support for pthreads. Harlan Stenn. 388* [Bug 2907] dist* build targets require our libevent/ to be enabled. HStenn. 389* [Bug 2912] no munlockall() under Windows. David Taylor, Harlan Stenn. 390* libntp/emalloc.c: Remove explicit include of stdint.h. Harlan Stenn. 391* Put Unity CPPFLAGS items in unity_config.h. Harlan Stenn. 392* tests/ntpd/g_leapsec.cpp typo fix. Harlan Stenn. 393* Phase 1 deprecation of google test in sntp/tests/. Harlan Stenn. 394* On some versions of HP-UX, inttypes.h does not include stdint.h. H.Stenn. 395* top_srcdir can change based on ntp v. sntp. Harlan Stenn. 396* sntp/tests/ function parameter list cleanup. Damir Tomić. 397* tests/libntp/ function parameter list cleanup. Damir Tomić. 398* tests/ntpd/ function parameter list cleanup. Damir Tomić. 399* sntp/unity/unity_config.h: handle stdint.h. Harlan Stenn. 400* sntp/unity/unity_internals.h: handle *INTPTR_MAX on old Solaris. H.Stenn. 401* tests/libntp/timevalops.c and timespecops.c fixed error printing. D.Tomić. 402* tests/libntp/ improvements in code and fixed error printing. Damir Tomić. 403* tests/libntp: a_md5encrypt.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c, 404 caltontp.c, clocktime.c, humandate.c, hextolfp.c, decodenetnum.c - fixed 405 formatting; first declaration, then code (C90); deleted unnecessary comments; 406 changed from sprintf to snprintf; fixed order of includes. Tomasz Flendrich 407* tests/libntp/lfpfunc.c remove unnecessary include, remove old comments, 408 fix formatting, cleanup. Tomasz Flendrich 409* tests/libntp/lfptostr.c remove unnecessary include, add consts, fix formatting. 410 Tomasz Flendrich 411* tests/libntp/statestr.c remove empty functions, remove unnecessary include, 412 fix formatting. Tomasz Flendrich 413* tests/libntp/modetoa.c fixed formatting. Tomasz Flendrich 414* tests/libntp/msyslog.c fixed formatting. Tomasz Flendrich 415* tests/libntp/numtoa.c deleted unnecessary empty functions, fixed formatting. 416 Tomasz Flendrich 417* tests/libntp/numtohost.c added const, fixed formatting. Tomasz Flendrich 418* tests/libntp/refnumtoa.c fixed formatting. Tomasz Flendrich 419* tests/libntp/ssl_init.c fixed formatting. Tomasz Flendrich 420* tests/libntp/tvtots.c fixed a bug, fixed formatting. Tomasz Flendrich 421* tests/libntp/uglydate.c removed an unnecessary include. Tomasz Flendrich 422* tests/libntp/vi64ops.c removed an unnecessary comment, fixed formatting. 423* tests/libntp/ymd3yd.c removed an empty function and an unnecessary include, 424fixed formatting. Tomasz Flendrich 425* tests/libntp/timespecops.c fixed formatting, fixed the order of includes, 426 removed unnecessary comments, cleanup. Tomasz Flendrich 427* tests/libntp/timevalops.c fixed the order of includes, deleted unnecessary 428 comments, cleanup. Tomasz Flendrich 429* tests/libntp/sockaddrtest.h making it agree to NTP's conventions of formatting. 430 Tomasz Flendrich 431* tests/libntp/lfptest.h cleanup. Tomasz Flendrich 432* tests/libntp/test-libntp.c fix formatting. Tomasz Flendrich 433* sntp/tests/crypto.c is now using proper Unity's assertions, fixed formatting. 434 Tomasz Flendrich 435* sntp/tests/kodDatabase.c added consts, deleted empty function, 436 fixed formatting. Tomasz Flendrich 437* sntp/tests/kodFile.c cleanup, fixed formatting. Tomasz Flendrich 438* sntp/tests/packetHandling.c is now using proper Unity's assertions, 439 fixed formatting, deleted unused variable. Tomasz Flendrich 440* sntp/tests/keyFile.c is now using proper Unity's assertions, fixed formatting. 441 Tomasz Flendrich 442* sntp/tests/packetProcessing.c changed from sprintf to snprintf, 443 fixed formatting. Tomasz Flendrich 444* sntp/tests/utilities.c is now using proper Unity's assertions, changed 445 the order of includes, fixed formatting, removed unnecessary comments. 446 Tomasz Flendrich 447* sntp/tests/sntptest.h fixed formatting. Tomasz Flendrich 448* sntp/tests/fileHandlingTest.h.in fixed a possible buffer overflow problem, 449 made one function do its job, deleted unnecessary prints, fixed formatting. 450 Tomasz Flendrich 451* sntp/unity/Makefile.am added a missing header. Tomasz Flendrich 452* sntp/unity/unity_config.h: Distribute it. Harlan Stenn. 453* sntp/libevent/evconfig-private.h: remove generated filefrom SCM. H.Stenn. 454* sntp/unity/Makefile.am: fix some broken paths. Harlan Stenn. 455* sntp/unity/unity.c: Clean up a printf(). Harlan Stenn. 456* Phase 1 deprecation of google test in tests/libntp/. Harlan Stenn. 457* Don't build sntp/libevent/sample/. Harlan Stenn. 458* tests/libntp/test_caltontp needs -lpthread. Harlan Stenn. 459* br-flock: --enable-local-libevent. Harlan Stenn. 460* Wrote tests for ntpd/ntp_prio_q.c. Tomasz Flendrich 461* scripts/lib/NTP/Util.pm: stratum output is version-dependent. Harlan Stenn. 462* Get rid of the NTP_ prefix on our assertion macros. Harlan Stenn. 463* Code cleanup. Harlan Stenn. 464* libntp/icom.c: Typo fix. Harlan Stenn. 465* util/ntptime.c: initialization nit. Harlan Stenn. 466* ntpd/ntp_peer.c:newpeer(): added a DEBUG_REQUIRE(srcadr). Harlan Stenn. 467* Add std_unity_tests to various Makefile.am files. Harlan Stenn. 468* ntpd/ntp_restrict.c: added a few assertions, created tests for this file. 469 Tomasz Flendrich 470* Changed progname to be const in many files - now it's consistent. Tomasz 471 Flendrich 472* Typo fix for GCC warning suppression. Harlan Stenn. 473* Added tests/ntpd/ntp_scanner.c test. Damir Tomić. 474* Added declarations to all Unity tests, and did minor fixes to them. 475 Reduced the number of warnings by half. Damir Tomić. 476* Updated generate_test_runner.rb and updated the sntp/unity/auto directory 477 with the latest Unity updates from Mark. Damir Tomić. 478* Retire google test - phase I. Harlan Stenn. 479* Unity test cleanup: move declaration of 'initializing'. Harlan Stenn. 480* Update the NEWS file. Harlan Stenn. 481* Autoconf cleanup. Harlan Stenn. 482* Unit test dist cleanup. Harlan Stenn. 483* Cleanup various test Makefile.am files. Harlan Stenn. 484* Pthread autoconf macro cleanup. Harlan Stenn. 485* Fix progname definition in unity runner scripts. Harlan Stenn. 486* Clean trailing whitespace in tests/ntpd/Makefile.am. Harlan Stenn. 487* Update the patch for bug 2817. Harlan Stenn. 488* More updates for bug 2817. Harlan Stenn. 489* Fix bugs in tests/ntpd/ntp_prio_q.c. Harlan Stenn. 490* gcc on older HPUX may need +allowdups. Harlan Stenn. 491* Adding missing MCAST protection. Harlan Stenn. 492* Disable certain test programs on certain platforms. Harlan Stenn. 493* Implement --enable-problem-tests (on by default). Harlan Stenn. 494* build system tweaks. Harlan Stenn. 495 496--- 497NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29) 498 499Focus: 1 Security fix. Bug fixes and enhancements. Leap-second improvements. 500 501Severity: MEDIUM 502 503Security Fix: 504 505* [Sec 2853] Crafted remote config packet can crash some versions of 506 ntpd. Aleksis Kauppinen, Juergen Perlinger, Harlan Stenn. 507 508Under specific circumstances an attacker can send a crafted packet to 509cause a vulnerable ntpd instance to crash. This requires each of the 510following to be true: 511 5121) ntpd set up to allow remote configuration (not allowed by default), and 5132) knowledge of the configuration password, and 5143) access to a computer entrusted to perform remote configuration. 515 516This vulnerability is considered low-risk. 517 518New features in this release: 519 520Optional (disabled by default) support to have ntpd provide smeared 521leap second time. A specially built and configured ntpd will only 522offer smeared time in response to client packets. These response 523packets will also contain a "refid" of 254.a.b.c, where the 24 bits 524of a, b, and c encode the amount of smear in a 2:22 integer:fraction 525format. See README.leapsmear and http://bugs.ntp.org/2855 for more 526information. 527 528 *IF YOU CHOOSE TO CONFIGURE NTPD TO PROVIDE LEAP SMEAR TIME* 529 *BE SURE YOU DO NOT OFFER THAT TIME ON PUBLIC TIMESERVERS.* 530 531We've imported the Unity test framework, and have begun converting 532the existing google-test items to this new framework. If you want 533to write new tests or change old ones, you'll need to have ruby 534installed. You don't need ruby to run the test suite. 535 536Bug Fixes and Improvements: 537 538* CID 739725: Fix a rare resource leak in libevent/listener.c. 539* CID 1295478: Quiet a pedantic potential error from the fix for Bug 2776. 540* CID 1296235: Fix refclock_jjy.c and correcting type of the driver40-ja.html 541* CID 1269537: Clean up a line of dead code in getShmTime(). 542* [Bug 1060] Buffer overruns in libparse/clk_rawdcf.c. Helge Oldach. 543* [Bug 2590] autogen-5.18.5. 544* [Bug 2612] restrict: Warn when 'monitor' can't be disabled because 545 of 'limited'. 546* [Bug 2650] fix includefile processing. 547* [Bug 2745] ntpd -x steps clock on leap second 548 Fixed an initial-value problem that caused misbehaviour in absence of 549 any leapsecond information. 550 Do leap second stepping only of the step adjustment is beyond the 551 proper jump distance limit and step correction is allowed at all. 552* [Bug 2750] build for Win64 553 Building for 32bit of loopback ppsapi needs def file 554* [Bug 2776] Improve ntpq's 'help keytype'. 555* [Bug 2778] Implement "apeers" ntpq command to include associd. 556* [Bug 2782] Refactor refclock_shm.c, add memory barrier protection. 557* [Bug 2792] If the IFF_RUNNING interface flag is supported then an 558 interface is ignored as long as this flag is not set since the 559 interface is not usable (e.g., no link). 560* [Bug 2794] Clean up kernel clock status reports. 561* [Bug 2800] refclock_true.c true_debug() can't open debug log because 562 of incompatible open/fdopen parameters. 563* [Bug 2804] install-local-data assumes GNU 'find' semantics. 564* [Bug 2805] ntpd fails to join multicast group. 565* [Bug 2806] refclock_jjy.c supports the Telephone JJY. 566* [Bug 2808] GPSD_JSON driver enhancements, step 1. 567 Fix crash during cleanup if GPS device not present and char device. 568 Increase internal token buffer to parse all JSON data, even SKY. 569 Defer logging of errors during driver init until the first unit is 570 started, so the syslog is not cluttered when the driver is not used. 571 Various improvements, see http://bugs.ntp.org/2808 for details. 572 Changed libjsmn to a more recent version. 573* [Bug 2810] refclock_shm.c memory barrier code needs tweaks for QNX. 574* [Bug 2813] HP-UX needs -D__STDC_VERSION__=199901L and limits.h. 575* [Bug 2815] net-snmp before v5.4 has circular library dependencies. 576* [Bug 2821] Add a missing NTP_PRINTF and a missing const. 577* [Bug 2822] New leap column in sntp broke NTP::Util.pm. 578* [Bug 2824] Convert update-leap to perl. (also see 2769) 579* [Bug 2825] Quiet file installation in html/ . 580* [Bug 2830] ntpd doesn't always transfer the correct TAI offset via autokey 581 NTPD transfers the current TAI (instead of an announcement) now. 582 This might still needed improvement. 583 Update autokey data ASAP when 'sys_tai' changes. 584 Fix unit test that was broken by changes for autokey update. 585 Avoid potential signature length issue and use DPRINTF where possible 586 in ntp_crypto.c. 587* [Bug 2832] refclock_jjy.c supports the TDC-300. 588* [Bug 2834] Correct a broken html tag in html/refclock.html 589* [Bug 2836] DFC77 patches from Frank Kardel to make decoding more 590 robust, and require 2 consecutive timestamps to be consistent. 591* [Bug 2837] Allow a configurable DSCP value. 592* [Bug 2837] add test for DSCP to ntpd/complete.conf.in 593* [Bug 2842] Glitch in ntp.conf.def documentation stanza. 594* [Bug 2842] Bug in mdoc2man. 595* [Bug 2843] make check fails on 4.3.36 596 Fixed compiler warnings about numeric range overflow 597 (The original topic was fixed in a byplay to bug#2830) 598* [Bug 2845] Harden memory allocation in ntpd. 599* [Bug 2852] 'make check' can't find unity.h. Hal Murray. 600* [Bug 2854] Missing brace in libntp/strdup.c. Masanari Iida. 601* [Bug 2855] Parser fix for conditional leap smear code. Harlan Stenn. 602* [Bug 2855] Report leap smear in the REFID. Harlan Stenn. 603* [Bug 2855] Implement conditional leap smear code. Martin Burnicki. 604* [Bug 2856] ntpd should wait() on terminated child processes. Paul Green. 605* [Bug 2857] Stratus VOS does not support SIGIO. Paul Green. 606* [Bug 2859] Improve raw DCF77 robustness deconding. Frank Kardel. 607* [Bug 2860] ntpq ifstats sanity check is too stringent. Frank Kardel. 608* html/drivers/driver22.html: typo fix. Harlan Stenn. 609* refidsmear test cleanup. Tomasz Flendrich. 610* refidsmear function support and tests. Harlan Stenn. 611* sntp/tests/Makefile.am: remove g_nameresolution.cpp as it tested 612 something that was only in the 4.2.6 sntp. Harlan Stenn. 613* Modified tests/bug-2803/Makefile.am so it builds Unity framework tests. 614 Damir Tomić 615* Modified tests/libtnp/Makefile.am so it builds Unity framework tests. 616 Damir Tomić 617* Modified sntp/tests/Makefile.am so it builds Unity framework tests. 618 Damir Tomić 619* tests/sandbox/smeartest.c: Harlan Stenn, Damir Tomic, Juergen Perlinger. 620* Converted from gtest to Unity: tests/bug-2803/. Damir Tomić 621* Converted from gtest to Unity: tests/libntp/ a_md5encrypt, atoint.c, 622 atouint.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c, 623 calyearstart.c, clocktime.c, hextoint.c, lfpfunc.c, modetoa.c, 624 numtoa.c, numtohost.c, refnumtoa.c, ssl_init.c, statestr.c, 625 timespecops.c, timevalops.c, uglydate.c, vi64ops.c, ymd2yd.c. 626 Damir Tomić 627* Converted from gtest to Unity: sntp/tests/ kodDatabase.c, kodFile.c, 628 networking.c, keyFile.c, utilities.cpp, sntptest.h, 629 fileHandlingTest.h. Damir Tomić 630* Initial support for experimental leap smear code. Harlan Stenn. 631* Fixes to sntp/tests/fileHandlingTest.h.in. Harlan Stenn. 632* Report select() debug messages at debug level 3 now. 633* sntp/scripts/genLocInfo: treat raspbian as debian. 634* Unity test framework fixes. 635 ** Requires ruby for changes to tests. 636* Initial support for PACKAGE_VERSION tests. 637* sntp/libpkgver belongs in EXTRA_DIST, not DIST_SUBDIRS. 638* tests/bug-2803/Makefile.am must distribute bug-2803.h. 639* Add an assert to the ntpq ifstats code. 640* Clean up the RLIMIT_STACK code. 641* Improve the ntpq documentation around the controlkey keyid. 642* ntpq.c cleanup. 643* Windows port build cleanup. 644 645--- 646NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/07) 647 648Focus: Security and Bug fixes, enhancements. 649 650Severity: MEDIUM 651 652In addition to bug fixes and enhancements, this release fixes the 653following medium-severity vulnerabilities involving private key 654authentication: 655 656* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 657 658 References: Sec 2779 / CVE-2015-1798 / VU#374268 659 Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not 660 including ntp-4.2.8p2 where the installation uses symmetric keys 661 to authenticate remote associations. 662 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 663 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 664 Summary: When ntpd is configured to use a symmetric key to authenticate 665 a remote NTP server/peer, it checks if the NTP message 666 authentication code (MAC) in received packets is valid, but not if 667 there actually is any MAC included. Packets without a MAC are 668 accepted as if they had a valid MAC. This allows a MITM attacker to 669 send false packets that are accepted by the client/peer without 670 having to know the symmetric key. The attacker needs to know the 671 transmit timestamp of the client to match it in the forged reply 672 and the false reply needs to reach the client before the genuine 673 reply from the server. The attacker doesn't necessarily need to be 674 relaying the packets between the client and the server. 675 676 Authentication using autokey doesn't have this problem as there is 677 a check that requires the key ID to be larger than NTP_MAXKEY, 678 which fails for packets without a MAC. 679 Mitigation: 680 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 681 or the NTP Public Services Project Download Page 682 Configure ntpd with enough time sources and monitor it properly. 683 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 684 685* [Sec 2781] Authentication doesn't protect symmetric associations against 686 DoS attacks. 687 688 References: Sec 2781 / CVE-2015-1799 / VU#374268 689 Affects: All NTP releases starting with at least xntp3.3wy up to but 690 not including ntp-4.2.8p2 where the installation uses symmetric 691 key authentication. 692 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 693 Note: the CVSS base Score for this issue could be 4.3 or lower, and 694 it could be higher than 5.4. 695 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 696 Summary: An attacker knowing that NTP hosts A and B are peering with 697 each other (symmetric association) can send a packet to host A 698 with source address of B which will set the NTP state variables 699 on A to the values sent by the attacker. Host A will then send 700 on its next poll to B a packet with originate timestamp that 701 doesn't match the transmit timestamp of B and the packet will 702 be dropped. If the attacker does this periodically for both 703 hosts, they won't be able to synchronize to each other. This is 704 a known denial-of-service attack, described at 705 https://www.eecis.udel.edu/~mills/onwire.html . 706 707 According to the document the NTP authentication is supposed to 708 protect symmetric associations against this attack, but that 709 doesn't seem to be the case. The state variables are updated even 710 when authentication fails and the peers are sending packets with 711 originate timestamps that don't match the transmit timestamps on 712 the receiving side. 713 714 This seems to be a very old problem, dating back to at least 715 xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905) 716 specifications, so other NTP implementations with support for 717 symmetric associations and authentication may be vulnerable too. 718 An update to the NTP RFC to correct this error is in-process. 719 Mitigation: 720 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 721 or the NTP Public Services Project Download Page 722 Note that for users of autokey, this specific style of MITM attack 723 is simply a long-known potential problem. 724 Configure ntpd with appropriate time sources and monitor ntpd. 725 Alert your staff if problems are detected. 726 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 727 728* New script: update-leap 729The update-leap script will verify and if necessary, update the 730leap-second definition file. 731It requires the following commands in order to work: 732 733 wget logger tr sed shasum 734 735Some may choose to run this from cron. It needs more portability testing. 736 737Bug Fixes and Improvements: 738 739* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003. 740* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument. 741* [Bug 2346] "graceful termination" signals do not do peer cleanup. 742* [Bug 2728] See if C99-style structure initialization works. 743* [Bug 2747] Upgrade libevent to 2.1.5-beta. 744* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. . 745* [Bug 2751] jitter.h has stale copies of l_fp macros. 746* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM. 747* [Bug 2757] Quiet compiler warnings. 748* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq. 749* [Bug 2763] Allow different thresholds for forward and backward steps. 750* [Bug 2766] ntp-keygen output files should not be world-readable. 751* [Bug 2767] ntp-keygen -M should symlink to ntp.keys. 752* [Bug 2771] nonvolatile value is documented in wrong units. 753* [Bug 2773] Early leap announcement from Palisade/Thunderbolt 754* [Bug 2774] Unreasonably verbose printout - leap pending/warning 755* [Bug 2775] ntp-keygen.c fails to compile under Windows. 756* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info. 757 Removed non-ASCII characters from some copyright comments. 758 Removed trailing whitespace. 759 Updated definitions for Meinberg clocks from current Meinberg header files. 760 Now use C99 fixed-width types and avoid non-ASCII characters in comments. 761 Account for updated definitions pulled from Meinberg header files. 762 Updated comments on Meinberg GPS receivers which are not only called GPS16x. 763 Replaced some constant numbers by defines from ntp_calendar.h 764 Modified creation of parse-specific variables for Meinberg devices 765 in gps16x_message(). 766 Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates. 767 Modified mbg_tm_str() which now expexts an additional parameter controlling 768 if the time status shall be printed. 769* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 770* [Sec 2781] Authentication doesn't protect symmetric associations against 771 DoS attacks. 772* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE. 773* [Bug 2789] Quiet compiler warnings from libevent. 774* [Bug 2790] If ntpd sets the Windows MM timer highest resolution 775 pause briefly before measuring system clock precision to yield 776 correct results. 777* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer. 778* Use predefined function types for parse driver functions 779 used to set up function pointers. 780 Account for changed prototype of parse_inp_fnc_t functions. 781 Cast parse conversion results to appropriate types to avoid 782 compiler warnings. 783 Let ioctl() for Windows accept a (void *) to avoid compiler warnings 784 when called with pointers to different types. 785 786--- 787NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 788 789Focus: Security and Bug fixes, enhancements. 790 791Severity: HIGH 792 793In addition to bug fixes and enhancements, this release fixes the 794following high-severity vulnerabilities: 795 796* vallen is not validated in several places in ntp_crypto.c, leading 797 to a potential information leak or possibly a crash 798 799 References: Sec 2671 / CVE-2014-9297 / VU#852879 800 Affects: All NTP4 releases before 4.2.8p1 that are running autokey. 801 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 802 Date Resolved: Stable (4.2.8p1) 04 Feb 2015 803 Summary: The vallen packet value is not validated in several code 804 paths in ntp_crypto.c which can lead to information leakage 805 or perhaps a crash of the ntpd process. 806 Mitigation - any of: 807 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 808 or the NTP Public Services Project Download Page. 809 Disable Autokey Authentication by removing, or commenting out, 810 all configuration directives beginning with the "crypto" 811 keyword in your ntp.conf file. 812 Credit: This vulnerability was discovered by Stephen Roettger of the 813 Google Security Team, with additional cases found by Sebastian 814 Krahmer of the SUSE Security Team and Harlan Stenn of Network 815 Time Foundation. 816 817* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses 818 can be bypassed. 819 820 References: Sec 2672 / CVE-2014-9298 / VU#852879 821 Affects: All NTP4 releases before 4.2.8p1, under at least some 822 versions of MacOS and Linux. *BSD has not been seen to be vulnerable. 823 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9 824 Date Resolved: Stable (4.2.8p1) 04 Feb 2014 825 Summary: While available kernels will prevent 127.0.0.1 addresses 826 from "appearing" on non-localhost IPv4 interfaces, some kernels 827 do not offer the same protection for ::1 source addresses on 828 IPv6 interfaces. Since NTP's access control is based on source 829 address and localhost addresses generally have no restrictions, 830 an attacker can send malicious control and configuration packets 831 by spoofing ::1 addresses from the outside. Note Well: This is 832 not really a bug in NTP, it's a problem with some OSes. If you 833 have one of these OSes where ::1 can be spoofed, ALL ::1 -based 834 ACL restrictions on any application can be bypassed! 835 Mitigation: 836 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 837 or the NTP Public Services Project Download Page 838 Install firewall rules to block packets claiming to come from 839 ::1 from inappropriate network interfaces. 840 Credit: This vulnerability was discovered by Stephen Roettger of 841 the Google Security Team. 842 843Additionally, over 30 bugfixes and improvements were made to the codebase. 844See the ChangeLog for more information. 845 846--- 847NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 848 849Focus: Security and Bug fixes, enhancements. 850 851Severity: HIGH 852 853In addition to bug fixes and enhancements, this release fixes the 854following high-severity vulnerabilities: 855 856************************** vv NOTE WELL vv ***************************** 857 858The vulnerabilities listed below can be significantly mitigated by 859following the BCP of putting 860 861 restrict default ... noquery 862 863in the ntp.conf file. With the exception of: 864 865 receive(): missing return on error 866 References: Sec 2670 / CVE-2014-9296 / VU#852879 867 868below (which is a limited-risk vulnerability), none of the recent 869vulnerabilities listed below can be exploited if the source IP is 870restricted from sending a 'query'-class packet by your ntp.conf file. 871 872************************** ^^ NOTE WELL ^^ ***************************** 873 874* Weak default key in config_auth(). 875 876 References: [Sec 2665] / CVE-2014-9293 / VU#852879 877 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 878 Vulnerable Versions: all releases prior to 4.2.7p11 879 Date Resolved: 28 Jan 2010 880 881 Summary: If no 'auth' key is set in the configuration file, ntpd 882 would generate a random key on the fly. There were two 883 problems with this: 1) the generated key was 31 bits in size, 884 and 2) it used the (now weak) ntp_random() function, which was 885 seeded with a 32-bit value and could only provide 32 bits of 886 entropy. This was sufficient back in the late 1990s when the 887 code was written. Not today. 888 889 Mitigation - any of: 890 - Upgrade to 4.2.7p11 or later. 891 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 892 893 Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta 894 of the Google Security Team. 895 896* Non-cryptographic random number generator with weak seed used by 897 ntp-keygen to generate symmetric keys. 898 899 References: [Sec 2666] / CVE-2014-9294 / VU#852879 900 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 901 Vulnerable Versions: All NTP4 releases before 4.2.7p230 902 Date Resolved: Dev (4.2.7p230) 01 Nov 2011 903 904 Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to 905 prepare a random number generator that was of good quality back 906 in the late 1990s. The random numbers produced was then used to 907 generate symmetric keys. In ntp-4.2.8 we use a current-technology 908 cryptographic random number generator, either RAND_bytes from 909 OpenSSL, or arc4random(). 910 911 Mitigation - any of: 912 - Upgrade to 4.2.7p230 or later. 913 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 914 915 Credit: This vulnerability was discovered in ntp-4.2.6 by 916 Stephen Roettger of the Google Security Team. 917 918* Buffer overflow in crypto_recv() 919 920 References: Sec 2667 / CVE-2014-9295 / VU#852879 921 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 922 Versions: All releases before 4.2.8 923 Date Resolved: Stable (4.2.8) 18 Dec 2014 924 925 Summary: When Autokey Authentication is enabled (i.e. the ntp.conf 926 file contains a 'crypto pw ...' directive) a remote attacker 927 can send a carefully crafted packet that can overflow a stack 928 buffer and potentially allow malicious code to be executed 929 with the privilege level of the ntpd process. 930 931 Mitigation - any of: 932 - Upgrade to 4.2.8, or later, or 933 - Disable Autokey Authentication by removing, or commenting out, 934 all configuration directives beginning with the crypto keyword 935 in your ntp.conf file. 936 937 Credit: This vulnerability was discovered by Stephen Roettger of the 938 Google Security Team. 939 940* Buffer overflow in ctl_putdata() 941 942 References: Sec 2668 / CVE-2014-9295 / VU#852879 943 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 944 Versions: All NTP4 releases before 4.2.8 945 Date Resolved: Stable (4.2.8) 18 Dec 2014 946 947 Summary: A remote attacker can send a carefully crafted packet that 948 can overflow a stack buffer and potentially allow malicious 949 code to be executed with the privilege level of the ntpd process. 950 951 Mitigation - any of: 952 - Upgrade to 4.2.8, or later. 953 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 954 955 Credit: This vulnerability was discovered by Stephen Roettger of the 956 Google Security Team. 957 958* Buffer overflow in configure() 959 960 References: Sec 2669 / CVE-2014-9295 / VU#852879 961 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 962 Versions: All NTP4 releases before 4.2.8 963 Date Resolved: Stable (4.2.8) 18 Dec 2014 964 965 Summary: A remote attacker can send a carefully crafted packet that 966 can overflow a stack buffer and potentially allow malicious 967 code to be executed with the privilege level of the ntpd process. 968 969 Mitigation - any of: 970 - Upgrade to 4.2.8, or later. 971 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 972 973 Credit: This vulnerability was discovered by Stephen Roettger of the 974 Google Security Team. 975 976* receive(): missing return on error 977 978 References: Sec 2670 / CVE-2014-9296 / VU#852879 979 CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0 980 Versions: All NTP4 releases before 4.2.8 981 Date Resolved: Stable (4.2.8) 18 Dec 2014 982 983 Summary: Code in ntp_proto.c:receive() was missing a 'return;' in 984 the code path where an error was detected, which meant 985 processing did not stop when a specific rare error occurred. 986 We haven't found a way for this bug to affect system integrity. 987 If there is no way to affect system integrity the base CVSS 988 score for this bug is 0. If there is one avenue through which 989 system integrity can be partially affected, the base score 990 becomes a 5. If system integrity can be partially affected 991 via all three integrity metrics, the CVSS base score become 7.5. 992 993 Mitigation - any of: 994 - Upgrade to 4.2.8, or later, 995 - Remove or comment out all configuration directives 996 beginning with the crypto keyword in your ntp.conf file. 997 998 Credit: This vulnerability was discovered by Stephen Roettger of the 999 Google Security Team. 1000 1001See http://support.ntp.org/security for more information. 1002 1003New features / changes in this release: 1004 1005Important Changes 1006 1007* Internal NTP Era counters 1008 1009The internal counters that track the "era" (range of years) we are in 1010rolls over every 136 years'. The current "era" started at the stroke of 1011midnight on 1 Jan 1900, and ends just before the stroke of midnight on 10121 Jan 2036. 1013In the past, we have used the "midpoint" of the range to decide which 1014era we were in. Given the longevity of some products, it became clear 1015that it would be more functional to "look back" less, and "look forward" 1016more. We now compile a timestamp into the ntpd executable and when we 1017get a timestamp we us the "built-on" to tell us what era we are in. 1018This check "looks back" 10 years, and "looks forward" 126 years. 1019 1020* ntpdc responses disabled by default 1021 1022Dave Hart writes: 1023 1024For a long time, ntpq and its mostly text-based mode 6 (control) 1025protocol have been preferred over ntpdc and its mode 7 (private 1026request) protocol for runtime queries and configuration. There has 1027been a goal of deprecating ntpdc, previously held back by numerous 1028capabilities exposed by ntpdc with no ntpq equivalent. I have been 1029adding commands to ntpq to cover these cases, and I believe I've 1030covered them all, though I've not compared command-by-command 1031recently. 1032 1033As I've said previously, the binary mode 7 protocol involves a lot of 1034hand-rolled structure layout and byte-swapping code in both ntpd and 1035ntpdc which is hard to get right. As ntpd grows and changes, the 1036changes are difficult to expose via ntpdc while maintaining forward 1037and backward compatibility between ntpdc and ntpd. In contrast, 1038ntpq's text-based, label=value approach involves more code reuse and 1039allows compatible changes without extra work in most cases. 1040 1041Mode 7 has always been defined as vendor/implementation-specific while 1042mode 6 is described in RFC 1305 and intended to be open to interoperate 1043with other implementations. There is an early draft of an updated 1044mode 6 description that likely will join the other NTPv4 RFCs 1045eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01) 1046 1047For these reasons, ntpd 4.2.7p230 by default disables processing of 1048ntpdc queries, reducing ntpd's attack surface and functionally 1049deprecating ntpdc. If you are in the habit of using ntpdc for certain 1050operations, please try the ntpq equivalent. If there's no equivalent, 1051please open a bug report at http://bugs.ntp.org./ 1052 1053In addition to the above, over 1100 issues have been resolved between 1054the 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution 1055lists these. 1056 1057--- 1058NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 1059 1060Focus: Bug fixes 1061 1062Severity: Medium 1063 1064This is a recommended upgrade. 1065 1066This release updates sys_rootdisp and sys_jitter calculations to match the 1067RFC specification, fixes a potential IPv6 address matching error for the 1068"nic" and "interface" configuration directives, suppresses the creation of 1069extraneous ephemeral associations for certain broadcastclient and 1070multicastclient configurations, cleans up some ntpq display issues, and 1071includes improvements to orphan mode, minor bugs fixes and code clean-ups. 1072 1073New features / changes in this release: 1074 1075ntpd 1076 1077 * Updated "nic" and "interface" IPv6 address handling to prevent 1078 mismatches with localhost [::1] and wildcard [::] which resulted from 1079 using the address/prefix format (e.g. fe80::/64) 1080 * Fix orphan mode stratum incorrectly counting to infinity 1081 * Orphan parent selection metric updated to includes missing ntohl() 1082 * Non-printable stratum 16 refid no longer sent to ntp 1083 * Duplicate ephemeral associations suppressed for broadcastclient and 1084 multicastclient without broadcastdelay 1085 * Exclude undetermined sys_refid from use in loopback TEST12 1086 * Exclude MODE_SERVER responses from KoD rate limiting 1087 * Include root delay in clock_update() sys_rootdisp calculations 1088 * get_systime() updated to exclude sys_residual offset (which only 1089 affected bits "below" sys_tick, the precision threshold) 1090 * sys.peer jitter weighting corrected in sys_jitter calculation 1091 1092ntpq 1093 1094 * -n option extended to include the billboard "server" column 1095 * IPv6 addresses in the local column truncated to prevent overruns 1096 1097--- 1098NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 1099 1100Focus: Bug fixes and portability improvements 1101 1102Severity: Medium 1103 1104This is a recommended upgrade. 1105 1106This release includes build infrastructure updates, code 1107clean-ups, minor bug fixes, fixes for a number of minor 1108ref-clock issues, and documentation revisions. 1109 1110Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 1111 1112New features / changes in this release: 1113 1114Build system 1115 1116* Fix checking for struct rtattr 1117* Update config.guess and config.sub for AIX 1118* Upgrade required version of autogen and libopts for building 1119 from our source code repository 1120 1121ntpd 1122 1123* Back-ported several fixes for Coverity warnings from ntp-dev 1124* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 1125* Allow "logconfig =allall" configuration directive 1126* Bind tentative IPv6 addresses on Linux 1127* Correct WWVB/Spectracom driver to timestamp CR instead of LF 1128* Improved tally bit handling to prevent incorrect ntpq peer status reports 1129* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 1130 candidate list unless they are designated a "prefer peer" 1131* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 1132 selection during the 'tos orphanwait' period 1133* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 1134 drivers 1135* Improved support of the Parse Refclock trusttime flag in Meinberg mode 1136* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 1137* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 1138 clock slew on Microsoft Windows 1139* Code cleanup in libntpq 1140 1141ntpdc 1142 1143* Fix timerstats reporting 1144 1145ntpdate 1146 1147* Reduce time required to set clock 1148* Allow a timeout greater than 2 seconds 1149 1150sntp 1151 1152* Backward incompatible command-line option change: 1153 -l/--filelog changed -l/--logfile (to be consistent with ntpd) 1154 1155Documentation 1156 1157* Update html2man. Fix some tags in the .html files 1158* Distribute ntp-wait.html 1159 1160--- 1161NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03) 1162 1163Focus: Bug fixes and portability improvements 1164 1165Severity: Medium 1166 1167This is a recommended upgrade. 1168 1169This release includes build infrastructure updates, code 1170clean-ups, minor bug fixes, fixes for a number of minor 1171ref-clock issues, and documentation revisions. 1172 1173Portability improvements in this release affect AIX, Atari FreeMiNT, 1174FreeBSD4, Linux and Microsoft Windows. 1175 1176New features / changes in this release: 1177 1178Build system 1179* Use lsb_release to get information about Linux distributions. 1180* 'test' is in /usr/bin (instead of /bin) on some systems. 1181* Basic sanity checks for the ChangeLog file. 1182* Source certain build files with ./filename for systems without . in PATH. 1183* IRIX portability fix. 1184* Use a single copy of the "libopts" code. 1185* autogen/libopts upgrade. 1186* configure.ac m4 quoting cleanup. 1187 1188ntpd 1189* Do not bind to IN6_IFF_ANYCAST addresses. 1190* Log the reason for exiting under Windows. 1191* Multicast fixes for Windows. 1192* Interpolation fixes for Windows. 1193* IPv4 and IPv6 Multicast fixes. 1194* Manycast solicitation fixes and general repairs. 1195* JJY refclock cleanup. 1196* NMEA refclock improvements. 1197* Oncore debug message cleanup. 1198* Palisade refclock now builds under Linux. 1199* Give RAWDCF more baud rates. 1200* Support Truetime Satellite clocks under Windows. 1201* Support Arbiter 1093C Satellite clocks under Windows. 1202* Make sure that the "filegen" configuration command defaults to "enable". 1203* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver. 1204* Prohibit 'includefile' directive in remote configuration command. 1205* Fix 'nic' interface bindings. 1206* Fix the way we link with openssl if openssl is installed in the base 1207 system. 1208 1209ntp-keygen 1210* Fix -V coredump. 1211* OpenSSL version display cleanup. 1212 1213ntpdc 1214* Many counters should be treated as unsigned. 1215 1216ntpdate 1217* Do not ignore replies with equal receive and transmit timestamps. 1218 1219ntpq 1220* libntpq warning cleanup. 1221 1222ntpsnmpd 1223* Correct SNMP type for "precision" and "resolution". 1224* Update the MIB from the draft version to RFC-5907. 1225 1226sntp 1227* Display timezone offset when showing time for sntp in the local 1228 timezone. 1229* Pay proper attention to RATE KoD packets. 1230* Fix a miscalculation of the offset. 1231* Properly parse empty lines in the key file. 1232* Logging cleanup. 1233* Use tv_usec correctly in set_time(). 1234* Documentation cleanup. 1235 1236--- 1237NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08) 1238 1239Focus: Bug fixes and portability improvements 1240 1241Severity: Medium 1242 1243This is a recommended upgrade. 1244 1245This release includes build infrastructure updates, code 1246clean-ups, minor bug fixes, fixes for a number of minor 1247ref-clock issues, improved KOD handling, OpenSSL related 1248updates and documentation revisions. 1249 1250Portability improvements in this release affect Irix, Linux, 1251Mac OS, Microsoft Windows, OpenBSD and QNX6 1252 1253New features / changes in this release: 1254 1255ntpd 1256* Range syntax for the trustedkey configuration directive 1257* Unified IPv4 and IPv6 restrict lists 1258 1259ntpdate 1260* Rate limiting and KOD handling 1261 1262ntpsnmpd 1263* default connection to net-snmpd via a unix-domain socket 1264* command-line 'socket name' option 1265 1266ntpq / ntpdc 1267* support for the "passwd ..." syntax 1268* key-type specific password prompts 1269 1270sntp 1271* MD5 authentication of an ntpd 1272* Broadcast and crypto 1273* OpenSSL support 1274 1275--- 1276NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09) 1277 1278Focus: Bug fixes, portability fixes, and documentation improvements 1279 1280Severity: Medium 1281 1282This is a recommended upgrade. 1283 1284--- 1285NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 1286 1287Focus: enhancements and bug fixes. 1288 1289--- 1290NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 1291 1292Focus: Security Fixes 1293 1294Severity: HIGH 1295 1296This release fixes the following high-severity vulnerability: 1297 1298* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563. 1299 1300 See http://support.ntp.org/security for more information. 1301 1302 NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. 1303 In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time 1304 transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 1305 request or a mode 7 error response from an address which is not listed 1306 in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will 1307 reply with a mode 7 error response (and log a message). In this case: 1308 1309 * If an attacker spoofs the source address of ntpd host A in a 1310 mode 7 response packet sent to ntpd host B, both A and B will 1311 continuously send each other error responses, for as long as 1312 those packets get through. 1313 1314 * If an attacker spoofs an address of ntpd host A in a mode 7 1315 response packet sent to ntpd host A, A will respond to itself 1316 endlessly, consuming CPU and logging excessively. 1317 1318 Credit for finding this vulnerability goes to Robin Park and Dmitri 1319 Vinokurov of Alcatel-Lucent. 1320 1321THIS IS A STRONGLY RECOMMENDED UPGRADE. 1322 1323--- 1324ntpd now syncs to refclocks right away. 1325 1326Backward-Incompatible changes: 1327 1328ntpd no longer accepts '-v name' or '-V name' to define internal variables. 1329Use '--var name' or '--dvar name' instead. (Bug 817) 1330 1331--- 1332NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04) 1333 1334Focus: Security and Bug Fixes 1335 1336Severity: HIGH 1337 1338This release fixes the following high-severity vulnerability: 1339 1340* [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252 1341 1342 See http://support.ntp.org/security for more information. 1343 1344 If autokey is enabled (if ntp.conf contains a "crypto pw whatever" 1345 line) then a carefully crafted packet sent to the machine will cause 1346 a buffer overflow and possible execution of injected code, running 1347 with the privileges of the ntpd process (often root). 1348 1349 Credit for finding this vulnerability goes to Chris Ries of CMU. 1350 1351This release fixes the following low-severity vulnerabilities: 1352 1353* [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159 1354 Credit for finding this vulnerability goes to Geoff Keating of Apple. 1355 1356* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows 1357 Credit for finding this issue goes to Dave Hart. 1358 1359This release fixes a number of bugs and adds some improvements: 1360 1361* Improved logging 1362* Fix many compiler warnings 1363* Many fixes and improvements for Windows 1364* Adds support for AIX 6.1 1365* Resolves some issues under MacOS X and Solaris 1366 1367THIS IS A STRONGLY RECOMMENDED UPGRADE. 1368 1369--- 1370NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07) 1371 1372Focus: Security Fix 1373 1374Severity: Low 1375 1376This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting 1377the OpenSSL library relating to the incorrect checking of the return 1378value of EVP_VerifyFinal function. 1379 1380Credit for finding this issue goes to the Google Security Team for 1381finding the original issue with OpenSSL, and to ocert.org for finding 1382the problem in NTP and telling us about it. 1383 1384This is a recommended upgrade. 1385--- 1386NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17) 1387 1388Focus: Minor Bugfixes 1389 1390This release fixes a number of Windows-specific ntpd bugs and 1391platform-independent ntpdate bugs. A logging bugfix has been applied 1392to the ONCORE driver. 1393 1394The "dynamic" keyword and is now obsolete and deferred binding to local 1395interfaces is the new default. The minimum time restriction for the 1396interface update interval has been dropped. 1397 1398A number of minor build system and documentation fixes are included. 1399 1400This is a recommended upgrade for Windows. 1401 1402--- 1403NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10) 1404 1405Focus: Minor Bugfixes 1406 1407This release updates certain copyright information, fixes several display 1408bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor 1409shutdown in the parse refclock driver, removes some lint from the code, 1410stops accessing certain buffers immediately after they were freed, fixes 1411a problem with non-command-line specification of -6, and allows the loopback 1412interface to share addresses with other interfaces. 1413 1414--- 1415NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29) 1416 1417Focus: Minor Bugfixes 1418 1419This release fixes a bug in Windows that made it difficult to 1420terminate ntpd under windows. 1421This is a recommended upgrade for Windows. 1422 1423--- 1424NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19) 1425 1426Focus: Minor Bugfixes 1427 1428This release fixes a multicast mode authentication problem, 1429an error in NTP packet handling on Windows that could lead to 1430ntpd crashing, and several other minor bugs. Handling of 1431multicast interfaces and logging configuration were improved. 1432The required versions of autogen and libopts were incremented. 1433This is a recommended upgrade for Windows and multicast users. 1434 1435--- 1436NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31) 1437 1438Focus: enhancements and bug fixes. 1439 1440Dynamic interface rescanning was added to simplify the use of ntpd in 1441conjunction with DHCP. GNU AutoGen is used for its command-line options 1442processing. Separate PPS devices are supported for PARSE refclocks, MD5 1443signatures are now provided for the release files. Drivers have been 1444added for some new ref-clocks and have been removed for some older 1445ref-clocks. This release also includes other improvements, documentation 1446and bug fixes. 1447 1448K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 1449C support. 1450 1451--- 1452NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15) 1453 1454Focus: enhancements and bug fixes. 1455