1--- 2NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/xx) 3 4Focus: Security and Bug fixes, enhancements. 5 6Severity: MEDIUM 7 8In addition to bug fixes and enhancements, this release fixes the 9following medium-severity vulnerabilities involving private key 10authentication: 11 12* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 13 14 References: Sec 2779 / CVE-2015-1798 / VU#374268 15 Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not 16 including ntp-4.2.8p2 where the installation uses symmetric keys 17 to authenticate remote associations. 18 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 19 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 20 Summary: When ntpd is configured to use a symmetric key to authenticate 21 a remote NTP server/peer, it checks if the NTP message 22 authentication code (MAC) in received packets is valid, but not if 23 there actually is any MAC included. Packets without a MAC are 24 accepted as if they had a valid MAC. This allows a MITM attacker to 25 send false packets that are accepted by the client/peer without 26 having to know the symmetric key. The attacker needs to know the 27 transmit timestamp of the client to match it in the forged reply 28 and the false reply needs to reach the client before the genuine 29 reply from the server. The attacker doesn't necessarily need to be 30 relaying the packets between the client and the server. 31 32 Authentication using autokey doesn't have this problem as there is 33 a check that requires the key ID to be larger than NTP_MAXKEY, 34 which fails for packets without a MAC. 35 Mitigation: 36 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 37 or the NTP Public Services Project Download Page 38 Configure ntpd with enough time sources and monitor it properly. 39 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 40 41* [Sec 2781] Authentication doesn't protect symmetric associations against 42 DoS attacks. 43 44 References: Sec 2781 / CVE-2015-1799 / VU#374268 45 Affects: All NTP releases starting with at least xntp3.3wy up to but 46 not including ntp-4.2.8p2 where the installation uses symmetric 47 key authentication. 48 CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4 49 Note: the CVSS base Score for this issue could be 4.3 or lower, and 50 it could be higher than 5.4. 51 Date Resolved: Stable (4.2.8p2) 07 Apr 2015 52 Summary: An attacker knowing that NTP hosts A and B are peering with 53 each other (symmetric association) can send a packet to host A 54 with source address of B which will set the NTP state variables 55 on A to the values sent by the attacker. Host A will then send 56 on its next poll to B a packet with originate timestamp that 57 doesn't match the transmit timestamp of B and the packet will 58 be dropped. If the attacker does this periodically for both 59 hosts, they won't be able to synchronize to each other. This is 60 a known denial-of-service attack, described at 61 https://www.eecis.udel.edu/~mills/onwire.html . 62 63 According to the document the NTP authentication is supposed to 64 protect symmetric associations against this attack, but that 65 doesn't seem to be the case. The state variables are updated even 66 when authentication fails and the peers are sending packets with 67 originate timestamps that don't match the transmit timestamps on 68 the receiving side. 69 70 This seems to be a very old problem, dating back to at least 71 xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905) 72 specifications, so other NTP implementations with support for 73 symmetric associations and authentication may be vulnerable too. 74 An update to the NTP RFC to correct this error is in-process. 75 Mitigation: 76 Upgrade to 4.2.8p2, or later, from the NTP Project Download Page 77 or the NTP Public Services Project Download Page 78 Note that for users of autokey, this specific style of MITM attack 79 is simply a long-known potential problem. 80 Configure ntpd with appropriate time sources and monitor ntpd. 81 Alert your staff if problems are detected. 82 Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 83 84* New script: update-leap 85The update-leap script will verify and if necessary, update the 86leap-second definition file. 87It requires the following commands in order to work: 88 89 wget logger tr sed shasum 90 91Some may choose to run this from cron. It needs more portability testing. 92 93Bug Fixes and Improvements: 94 95* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003. 96* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument. 97* [Bug 2346] "graceful termination" signals do not do peer cleanup. 98* [Bug 2728] See if C99-style structure initialization works. 99* [Bug 2747] Upgrade libevent to 2.1.5-beta. 100* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. . 101* [Bug 2751] jitter.h has stale copies of l_fp macros. 102* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM. 103* [Bug 2757] Quiet compiler warnings. 104* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq. 105* [Bug 2763] Allow different thresholds for forward and backward steps. 106* [Bug 2766] ntp-keygen output files should not be world-readable. 107* [Bug 2767] ntp-keygen -M should symlink to ntp.keys. 108* [Bug 2771] nonvolatile value is documented in wrong units. 109* [Bug 2773] Early leap announcement from Palisade/Thunderbolt 110* [Bug 2774] Unreasonably verbose printout - leap pending/warning 111* [Bug 2775] ntp-keygen.c fails to compile under Windows. 112* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info. 113 Removed non-ASCII characters from some copyright comments. 114 Removed trailing whitespace. 115 Updated definitions for Meinberg clocks from current Meinberg header files. 116 Now use C99 fixed-width types and avoid non-ASCII characters in comments. 117 Account for updated definitions pulled from Meinberg header files. 118 Updated comments on Meinberg GPS receivers which are not only called GPS16x. 119 Replaced some constant numbers by defines from ntp_calendar.h 120 Modified creation of parse-specific variables for Meinberg devices 121 in gps16x_message(). 122 Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates. 123 Modified mbg_tm_str() which now expexts an additional parameter controlling 124 if the time status shall be printed. 125* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto. 126* [Sec 2781] Authentication doesn't protect symmetric associations against 127 DoS attacks. 128* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE. 129* [Bug 2789] Quiet compiler warnings from libevent. 130* [Bug 2790] If ntpd sets the Windows MM timer highest resolution 131 pause briefly before measuring system clock precision to yield 132 correct results. 133* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer. 134* Use predefined function types for parse driver functions 135 used to set up function pointers. 136 Account for changed prototype of parse_inp_fnc_t functions. 137 Cast parse conversion results to appropriate types to avoid 138 compiler warnings. 139 Let ioctl() for Windows accept a (void *) to avoid compiler warnings 140 when called with pointers to different types. 141 142--- 143NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 144 145Focus: Security and Bug fixes, enhancements. 146 147Severity: HIGH 148 149In addition to bug fixes and enhancements, this release fixes the 150following high-severity vulnerabilities: 151 152* vallen is not validated in several places in ntp_crypto.c, leading 153 to a potential information leak or possibly a crash 154 155 References: Sec 2671 / CVE-2014-9297 / VU#852879 156 Affects: All NTP4 releases before 4.2.8p1 that are running autokey. 157 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 158 Date Resolved: Stable (4.2.8p1) 04 Feb 2015 159 Summary: The vallen packet value is not validated in several code 160 paths in ntp_crypto.c which can lead to information leakage 161 or perhaps a crash of the ntpd process. 162 Mitigation - any of: 163 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 164 or the NTP Public Services Project Download Page. 165 Disable Autokey Authentication by removing, or commenting out, 166 all configuration directives beginning with the "crypto" 167 keyword in your ntp.conf file. 168 Credit: This vulnerability was discovered by Stephen Roettger of the 169 Google Security Team, with additional cases found by Sebastian 170 Krahmer of the SUSE Security Team and Harlan Stenn of Network 171 Time Foundation. 172 173* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses 174 can be bypassed. 175 176 References: Sec 2672 / CVE-2014-9298 / VU#852879 177 Affects: All NTP4 releases before 4.2.8p1, under at least some 178 versions of MacOS and Linux. *BSD has not been seen to be vulnerable. 179 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9 180 Date Resolved: Stable (4.2.8p1) 04 Feb 2014 181 Summary: While available kernels will prevent 127.0.0.1 addresses 182 from "appearing" on non-localhost IPv4 interfaces, some kernels 183 do not offer the same protection for ::1 source addresses on 184 IPv6 interfaces. Since NTP's access control is based on source 185 address and localhost addresses generally have no restrictions, 186 an attacker can send malicious control and configuration packets 187 by spoofing ::1 addresses from the outside. Note Well: This is 188 not really a bug in NTP, it's a problem with some OSes. If you 189 have one of these OSes where ::1 can be spoofed, ALL ::1 -based 190 ACL restrictions on any application can be bypassed! 191 Mitigation: 192 Upgrade to 4.2.8p1, or later, from the NTP Project Download Page 193 or the NTP Public Services Project Download Page 194 Install firewall rules to block packets claiming to come from 195 ::1 from inappropriate network interfaces. 196 Credit: This vulnerability was discovered by Stephen Roettger of 197 the Google Security Team. 198 199Additionally, over 30 bugfixes and improvements were made to the codebase. 200See the ChangeLog for more information. 201 202--- 203NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 204 205Focus: Security and Bug fixes, enhancements. 206 207Severity: HIGH 208 209In addition to bug fixes and enhancements, this release fixes the 210following high-severity vulnerabilities: 211 212************************** vv NOTE WELL vv ***************************** 213 214The vulnerabilities listed below can be significantly mitigated by 215following the BCP of putting 216 217 restrict default ... noquery 218 219in the ntp.conf file. With the exception of: 220 221 receive(): missing return on error 222 References: Sec 2670 / CVE-2014-9296 / VU#852879 223 224below (which is a limited-risk vulnerability), none of the recent 225vulnerabilities listed below can be exploited if the source IP is 226restricted from sending a 'query'-class packet by your ntp.conf file. 227 228************************** ^^ NOTE WELL ^^ ***************************** 229 230* Weak default key in config_auth(). 231 232 References: [Sec 2665] / CVE-2014-9293 / VU#852879 233 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 234 Vulnerable Versions: all releases prior to 4.2.7p11 235 Date Resolved: 28 Jan 2010 236 237 Summary: If no 'auth' key is set in the configuration file, ntpd 238 would generate a random key on the fly. There were two 239 problems with this: 1) the generated key was 31 bits in size, 240 and 2) it used the (now weak) ntp_random() function, which was 241 seeded with a 32-bit value and could only provide 32 bits of 242 entropy. This was sufficient back in the late 1990s when the 243 code was written. Not today. 244 245 Mitigation - any of: 246 - Upgrade to 4.2.7p11 or later. 247 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 248 249 Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta 250 of the Google Security Team. 251 252* Non-cryptographic random number generator with weak seed used by 253 ntp-keygen to generate symmetric keys. 254 255 References: [Sec 2666] / CVE-2014-9294 / VU#852879 256 CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3 257 Vulnerable Versions: All NTP4 releases before 4.2.7p230 258 Date Resolved: Dev (4.2.7p230) 01 Nov 2011 259 260 Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to 261 prepare a random number generator that was of good quality back 262 in the late 1990s. The random numbers produced was then used to 263 generate symmetric keys. In ntp-4.2.8 we use a current-technology 264 cryptographic random number generator, either RAND_bytes from 265 OpenSSL, or arc4random(). 266 267 Mitigation - any of: 268 - Upgrade to 4.2.7p230 or later. 269 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 270 271 Credit: This vulnerability was discovered in ntp-4.2.6 by 272 Stephen Roettger of the Google Security Team. 273 274* Buffer overflow in crypto_recv() 275 276 References: Sec 2667 / CVE-2014-9295 / VU#852879 277 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 278 Versions: All releases before 4.2.8 279 Date Resolved: Stable (4.2.8) 18 Dec 2014 280 281 Summary: When Autokey Authentication is enabled (i.e. the ntp.conf 282 file contains a 'crypto pw ...' directive) a remote attacker 283 can send a carefully crafted packet that can overflow a stack 284 buffer and potentially allow malicious code to be executed 285 with the privilege level of the ntpd process. 286 287 Mitigation - any of: 288 - Upgrade to 4.2.8, or later, or 289 - Disable Autokey Authentication by removing, or commenting out, 290 all configuration directives beginning with the crypto keyword 291 in your ntp.conf file. 292 293 Credit: This vulnerability was discovered by Stephen Roettger of the 294 Google Security Team. 295 296* Buffer overflow in ctl_putdata() 297 298 References: Sec 2668 / CVE-2014-9295 / VU#852879 299 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 300 Versions: All NTP4 releases before 4.2.8 301 Date Resolved: Stable (4.2.8) 18 Dec 2014 302 303 Summary: A remote attacker can send a carefully crafted packet that 304 can overflow a stack buffer and potentially allow malicious 305 code to be executed with the privilege level of the ntpd process. 306 307 Mitigation - any of: 308 - Upgrade to 4.2.8, or later. 309 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 310 311 Credit: This vulnerability was discovered by Stephen Roettger of the 312 Google Security Team. 313 314* Buffer overflow in configure() 315 316 References: Sec 2669 / CVE-2014-9295 / VU#852879 317 CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5 318 Versions: All NTP4 releases before 4.2.8 319 Date Resolved: Stable (4.2.8) 18 Dec 2014 320 321 Summary: A remote attacker can send a carefully crafted packet that 322 can overflow a stack buffer and potentially allow malicious 323 code to be executed with the privilege level of the ntpd process. 324 325 Mitigation - any of: 326 - Upgrade to 4.2.8, or later. 327 - Follow BCP and put 'restrict ... noquery' in your ntp.conf file. 328 329 Credit: This vulnerability was discovered by Stephen Roettger of the 330 Google Security Team. 331 332* receive(): missing return on error 333 334 References: Sec 2670 / CVE-2014-9296 / VU#852879 335 CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0 336 Versions: All NTP4 releases before 4.2.8 337 Date Resolved: Stable (4.2.8) 18 Dec 2014 338 339 Summary: Code in ntp_proto.c:receive() was missing a 'return;' in 340 the code path where an error was detected, which meant 341 processing did not stop when a specific rare error occurred. 342 We haven't found a way for this bug to affect system integrity. 343 If there is no way to affect system integrity the base CVSS 344 score for this bug is 0. If there is one avenue through which 345 system integrity can be partially affected, the base score 346 becomes a 5. If system integrity can be partially affected 347 via all three integrity metrics, the CVSS base score become 7.5. 348 349 Mitigation - any of: 350 - Upgrade to 4.2.8, or later, 351 - Remove or comment out all configuration directives 352 beginning with the crypto keyword in your ntp.conf file. 353 354 Credit: This vulnerability was discovered by Stephen Roettger of the 355 Google Security Team. 356 357See http://support.ntp.org/security for more information. 358 359New features / changes in this release: 360 361Important Changes 362 363* Internal NTP Era counters 364 365The internal counters that track the "era" (range of years) we are in 366rolls over every 136 years'. The current "era" started at the stroke of 367midnight on 1 Jan 1900, and ends just before the stroke of midnight on 3681 Jan 2036. 369In the past, we have used the "midpoint" of the range to decide which 370era we were in. Given the longevity of some products, it became clear 371that it would be more functional to "look back" less, and "look forward" 372more. We now compile a timestamp into the ntpd executable and when we 373get a timestamp we us the "built-on" to tell us what era we are in. 374This check "looks back" 10 years, and "looks forward" 126 years. 375 376* ntpdc responses disabled by default 377 378Dave Hart writes: 379 380For a long time, ntpq and its mostly text-based mode 6 (control) 381protocol have been preferred over ntpdc and its mode 7 (private 382request) protocol for runtime queries and configuration. There has 383been a goal of deprecating ntpdc, previously held back by numerous 384capabilities exposed by ntpdc with no ntpq equivalent. I have been 385adding commands to ntpq to cover these cases, and I believe I've 386covered them all, though I've not compared command-by-command 387recently. 388 389As I've said previously, the binary mode 7 protocol involves a lot of 390hand-rolled structure layout and byte-swapping code in both ntpd and 391ntpdc which is hard to get right. As ntpd grows and changes, the 392changes are difficult to expose via ntpdc while maintaining forward 393and backward compatibility between ntpdc and ntpd. In contrast, 394ntpq's text-based, label=value approach involves more code reuse and 395allows compatible changes without extra work in most cases. 396 397Mode 7 has always been defined as vendor/implementation-specific while 398mode 6 is described in RFC 1305 and intended to be open to interoperate 399with other implementations. There is an early draft of an updated 400mode 6 description that likely will join the other NTPv4 RFCs 401eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01) 402 403For these reasons, ntpd 4.2.7p230 by default disables processing of 404ntpdc queries, reducing ntpd's attack surface and functionally 405deprecating ntpdc. If you are in the habit of using ntpdc for certain 406operations, please try the ntpq equivalent. If there's no equivalent, 407please open a bug report at http://bugs.ntp.org./ 408 409In addition to the above, over 1100 issues have been resolved between 410the 4.2.6 branch and 4.2.8. The ChangeLog file in the distribution 411lists these. 412 413--- 414NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 415 416Focus: Bug fixes 417 418Severity: Medium 419 420This is a recommended upgrade. 421 422This release updates sys_rootdisp and sys_jitter calculations to match the 423RFC specification, fixes a potential IPv6 address matching error for the 424"nic" and "interface" configuration directives, suppresses the creation of 425extraneous ephemeral associations for certain broadcastclient and 426multicastclient configurations, cleans up some ntpq display issues, and 427includes improvements to orphan mode, minor bugs fixes and code clean-ups. 428 429New features / changes in this release: 430 431ntpd 432 433 * Updated "nic" and "interface" IPv6 address handling to prevent 434 mismatches with localhost [::1] and wildcard [::] which resulted from 435 using the address/prefix format (e.g. fe80::/64) 436 * Fix orphan mode stratum incorrectly counting to infinity 437 * Orphan parent selection metric updated to includes missing ntohl() 438 * Non-printable stratum 16 refid no longer sent to ntp 439 * Duplicate ephemeral associations suppressed for broadcastclient and 440 multicastclient without broadcastdelay 441 * Exclude undetermined sys_refid from use in loopback TEST12 442 * Exclude MODE_SERVER responses from KoD rate limiting 443 * Include root delay in clock_update() sys_rootdisp calculations 444 * get_systime() updated to exclude sys_residual offset (which only 445 affected bits "below" sys_tick, the precision threshold) 446 * sys.peer jitter weighting corrected in sys_jitter calculation 447 448ntpq 449 450 * -n option extended to include the billboard "server" column 451 * IPv6 addresses in the local column truncated to prevent overruns 452 453--- 454NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 455 456Focus: Bug fixes and portability improvements 457 458Severity: Medium 459 460This is a recommended upgrade. 461 462This release includes build infrastructure updates, code 463clean-ups, minor bug fixes, fixes for a number of minor 464ref-clock issues, and documentation revisions. 465 466Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 467 468New features / changes in this release: 469 470Build system 471 472* Fix checking for struct rtattr 473* Update config.guess and config.sub for AIX 474* Upgrade required version of autogen and libopts for building 475 from our source code repository 476 477ntpd 478 479* Back-ported several fixes for Coverity warnings from ntp-dev 480* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 481* Allow "logconfig =allall" configuration directive 482* Bind tentative IPv6 addresses on Linux 483* Correct WWVB/Spectracom driver to timestamp CR instead of LF 484* Improved tally bit handling to prevent incorrect ntpq peer status reports 485* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 486 candidate list unless they are designated a "prefer peer" 487* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 488 selection during the 'tos orphanwait' period 489* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 490 drivers 491* Improved support of the Parse Refclock trusttime flag in Meinberg mode 492* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 493* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 494 clock slew on Microsoft Windows 495* Code cleanup in libntpq 496 497ntpdc 498 499* Fix timerstats reporting 500 501ntpdate 502 503* Reduce time required to set clock 504* Allow a timeout greater than 2 seconds 505 506sntp 507 508* Backward incompatible command-line option change: 509 -l/--filelog changed -l/--logfile (to be consistent with ntpd) 510 511Documentation 512 513* Update html2man. Fix some tags in the .html files 514* Distribute ntp-wait.html 515 516--- 517NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03) 518 519Focus: Bug fixes and portability improvements 520 521Severity: Medium 522 523This is a recommended upgrade. 524 525This release includes build infrastructure updates, code 526clean-ups, minor bug fixes, fixes for a number of minor 527ref-clock issues, and documentation revisions. 528 529Portability improvements in this release affect AIX, Atari FreeMiNT, 530FreeBSD4, Linux and Microsoft Windows. 531 532New features / changes in this release: 533 534Build system 535* Use lsb_release to get information about Linux distributions. 536* 'test' is in /usr/bin (instead of /bin) on some systems. 537* Basic sanity checks for the ChangeLog file. 538* Source certain build files with ./filename for systems without . in PATH. 539* IRIX portability fix. 540* Use a single copy of the "libopts" code. 541* autogen/libopts upgrade. 542* configure.ac m4 quoting cleanup. 543 544ntpd 545* Do not bind to IN6_IFF_ANYCAST addresses. 546* Log the reason for exiting under Windows. 547* Multicast fixes for Windows. 548* Interpolation fixes for Windows. 549* IPv4 and IPv6 Multicast fixes. 550* Manycast solicitation fixes and general repairs. 551* JJY refclock cleanup. 552* NMEA refclock improvements. 553* Oncore debug message cleanup. 554* Palisade refclock now builds under Linux. 555* Give RAWDCF more baud rates. 556* Support Truetime Satellite clocks under Windows. 557* Support Arbiter 1093C Satellite clocks under Windows. 558* Make sure that the "filegen" configuration command defaults to "enable". 559* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver. 560* Prohibit 'includefile' directive in remote configuration command. 561* Fix 'nic' interface bindings. 562* Fix the way we link with openssl if openssl is installed in the base 563 system. 564 565ntp-keygen 566* Fix -V coredump. 567* OpenSSL version display cleanup. 568 569ntpdc 570* Many counters should be treated as unsigned. 571 572ntpdate 573* Do not ignore replies with equal receive and transmit timestamps. 574 575ntpq 576* libntpq warning cleanup. 577 578ntpsnmpd 579* Correct SNMP type for "precision" and "resolution". 580* Update the MIB from the draft version to RFC-5907. 581 582sntp 583* Display timezone offset when showing time for sntp in the local 584 timezone. 585* Pay proper attention to RATE KoD packets. 586* Fix a miscalculation of the offset. 587* Properly parse empty lines in the key file. 588* Logging cleanup. 589* Use tv_usec correctly in set_time(). 590* Documentation cleanup. 591 592--- 593NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08) 594 595Focus: Bug fixes and portability improvements 596 597Severity: Medium 598 599This is a recommended upgrade. 600 601This release includes build infrastructure updates, code 602clean-ups, minor bug fixes, fixes for a number of minor 603ref-clock issues, improved KOD handling, OpenSSL related 604updates and documentation revisions. 605 606Portability improvements in this release affect Irix, Linux, 607Mac OS, Microsoft Windows, OpenBSD and QNX6 608 609New features / changes in this release: 610 611ntpd 612* Range syntax for the trustedkey configuration directive 613* Unified IPv4 and IPv6 restrict lists 614 615ntpdate 616* Rate limiting and KOD handling 617 618ntpsnmpd 619* default connection to net-snmpd via a unix-domain socket 620* command-line 'socket name' option 621 622ntpq / ntpdc 623* support for the "passwd ..." syntax 624* key-type specific password prompts 625 626sntp 627* MD5 authentication of an ntpd 628* Broadcast and crypto 629* OpenSSL support 630 631--- 632NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09) 633 634Focus: Bug fixes, portability fixes, and documentation improvements 635 636Severity: Medium 637 638This is a recommended upgrade. 639 640--- 641NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 642 643Focus: enhancements and bug fixes. 644 645--- 646NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08) 647 648Focus: Security Fixes 649 650Severity: HIGH 651 652This release fixes the following high-severity vulnerability: 653 654* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563. 655 656 See http://support.ntp.org/security for more information. 657 658 NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility. 659 In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time 660 transfers use modes 1 through 5. Upon receipt of an incorrect mode 7 661 request or a mode 7 error response from an address which is not listed 662 in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will 663 reply with a mode 7 error response (and log a message). In this case: 664 665 * If an attacker spoofs the source address of ntpd host A in a 666 mode 7 response packet sent to ntpd host B, both A and B will 667 continuously send each other error responses, for as long as 668 those packets get through. 669 670 * If an attacker spoofs an address of ntpd host A in a mode 7 671 response packet sent to ntpd host A, A will respond to itself 672 endlessly, consuming CPU and logging excessively. 673 674 Credit for finding this vulnerability goes to Robin Park and Dmitri 675 Vinokurov of Alcatel-Lucent. 676 677THIS IS A STRONGLY RECOMMENDED UPGRADE. 678 679--- 680ntpd now syncs to refclocks right away. 681 682Backward-Incompatible changes: 683 684ntpd no longer accepts '-v name' or '-V name' to define internal variables. 685Use '--var name' or '--dvar name' instead. (Bug 817) 686 687--- 688NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04) 689 690Focus: Security and Bug Fixes 691 692Severity: HIGH 693 694This release fixes the following high-severity vulnerability: 695 696* [Sec 1151] Remote exploit if autokey is enabled. CVE-2009-1252 697 698 See http://support.ntp.org/security for more information. 699 700 If autokey is enabled (if ntp.conf contains a "crypto pw whatever" 701 line) then a carefully crafted packet sent to the machine will cause 702 a buffer overflow and possible execution of injected code, running 703 with the privileges of the ntpd process (often root). 704 705 Credit for finding this vulnerability goes to Chris Ries of CMU. 706 707This release fixes the following low-severity vulnerabilities: 708 709* [Sec 1144] limited (two byte) buffer overflow in ntpq. CVE-2009-0159 710 Credit for finding this vulnerability goes to Geoff Keating of Apple. 711 712* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows 713 Credit for finding this issue goes to Dave Hart. 714 715This release fixes a number of bugs and adds some improvements: 716 717* Improved logging 718* Fix many compiler warnings 719* Many fixes and improvements for Windows 720* Adds support for AIX 6.1 721* Resolves some issues under MacOS X and Solaris 722 723THIS IS A STRONGLY RECOMMENDED UPGRADE. 724 725--- 726NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07) 727 728Focus: Security Fix 729 730Severity: Low 731 732This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting 733the OpenSSL library relating to the incorrect checking of the return 734value of EVP_VerifyFinal function. 735 736Credit for finding this issue goes to the Google Security Team for 737finding the original issue with OpenSSL, and to ocert.org for finding 738the problem in NTP and telling us about it. 739 740This is a recommended upgrade. 741--- 742NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17) 743 744Focus: Minor Bugfixes 745 746This release fixes a number of Windows-specific ntpd bugs and 747platform-independent ntpdate bugs. A logging bugfix has been applied 748to the ONCORE driver. 749 750The "dynamic" keyword and is now obsolete and deferred binding to local 751interfaces is the new default. The minimum time restriction for the 752interface update interval has been dropped. 753 754A number of minor build system and documentation fixes are included. 755 756This is a recommended upgrade for Windows. 757 758--- 759NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10) 760 761Focus: Minor Bugfixes 762 763This release updates certain copyright information, fixes several display 764bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor 765shutdown in the parse refclock driver, removes some lint from the code, 766stops accessing certain buffers immediately after they were freed, fixes 767a problem with non-command-line specification of -6, and allows the loopback 768interface to share addresses with other interfaces. 769 770--- 771NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29) 772 773Focus: Minor Bugfixes 774 775This release fixes a bug in Windows that made it difficult to 776terminate ntpd under windows. 777This is a recommended upgrade for Windows. 778 779--- 780NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19) 781 782Focus: Minor Bugfixes 783 784This release fixes a multicast mode authentication problem, 785an error in NTP packet handling on Windows that could lead to 786ntpd crashing, and several other minor bugs. Handling of 787multicast interfaces and logging configuration were improved. 788The required versions of autogen and libopts were incremented. 789This is a recommended upgrade for Windows and multicast users. 790 791--- 792NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31) 793 794Focus: enhancements and bug fixes. 795 796Dynamic interface rescanning was added to simplify the use of ntpd in 797conjunction with DHCP. GNU AutoGen is used for its command-line options 798processing. Separate PPS devices are supported for PARSE refclocks, MD5 799signatures are now provided for the release files. Drivers have been 800added for some new ref-clocks and have been removed for some older 801ref-clocks. This release also includes other improvements, documentation 802and bug fixes. 803 804K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 805C support. 806 807--- 808NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15) 809 810Focus: enhancements and bug fixes. 811