NEWS revision 293896
1---
2
3NTP 4.2.8p5
4
5Focus: Security, Bug fixes, enhancements.
6
7Severity: MEDIUM
8
9In addition to bug fixes and enhancements, this release fixes the
10following medium-severity vulnerability:
11
12* Small-step/big-step.  Close the panic gate earlier.
13    References: Sec 2956, CVE-2015-5300
14    Affects: All ntp-4 releases up to, but not including 4.2.8p5, and
15	4.3.0 up to, but not including 4.3.78
16    CVSS3: (AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:L) Base Score: 4.0, MEDIUM
17    Summary: If ntpd is always started with the -g option, which is
18	common and against long-standing recommendation, and if at the
19	moment ntpd is restarted an attacker can immediately respond to
20	enough requests from enough sources trusted by the target, which
21	is difficult and not common, there is a window of opportunity
22	where the attacker can cause ntpd to set the time to an
23	arbitrary value. Similarly, if an attacker is able to respond
24	to enough requests from enough sources trusted by the target,
25	the attacker can cause ntpd to abort and restart, at which
26	point it can tell the target to set the time to an arbitrary
27	value if and only if ntpd was re-started against long-standing
28	recommendation with the -g flag, or if ntpd was not given the
29	-g flag, the attacker can move the target system's time by at
30	most 900 seconds' time per attack.
31    Mitigation:
32	Configure ntpd to get time from multiple sources.
33	Upgrade to 4.2.8p5, or later, from the NTP Project Download
34	    Page or the NTP Public Services Project Download Page
35	As we've long documented, only use the -g option to ntpd in
36	    cold-start situations.
37	Monitor your ntpd instances. 
38    Credit: This weakness was discovered by Aanchal Malhotra,
39	Isaac E. Cohen, and Sharon Goldberg at Boston University. 
40
41    NOTE WELL: The -g flag disables the limit check on the panic_gate
42	in ntpd, which is 900 seconds by default. The bug identified by
43	the researchers at Boston University is that the panic_gate
44	check was only re-enabled after the first change to the system
45	clock that was greater than 128 milliseconds, by default. The
46	correct behavior is that the panic_gate check should be
47	re-enabled after any initial time correction.
48
49	If an attacker is able to inject consistent but erroneous time
50	responses to your systems via the network or "over the air",
51	perhaps by spoofing radio, cellphone, or navigation satellite
52	transmissions, they are in a great position to affect your
53	system's clock. There comes a point where your very best
54	defenses include:
55
56	    Configure ntpd to get time from multiple sources.
57	    Monitor your ntpd instances. 
58
59Other fixes:
60
61* Coverity submission process updated from Coverity 5 to Coverity 7.
62  The NTP codebase has been undergoing regular Coverity scans on an
63  ongoing basis since 2006.  As part of our recent upgrade from
64  Coverity 5 to Coverity 7, Coverity identified 16 nits in some of
65  the newly-written Unity test programs.  These were fixed.
66* [Bug 2829] Clean up pipe_fds in ntpd.c  perlinger@ntp.org
67* [Bug 2887] stratum -1 config results as showing value 99
68  - fudge stratum should only accept values [0..16]. perlinger@ntp.org
69* [Bug 2932] Update leapsecond file info in miscopt.html.  CWoodbury, HStenn.
70* [Bug 2934] tests/ntpd/t-ntp_scanner.c has a magic constant wired in.  HMurray
71* [Bug 2944] errno is not preserved properly in ntpdate after sendto call.
72  - applied patch by Christos Zoulas.  perlinger@ntp.org
73* [Bug 2952] Peer associations broken by fix for Bug 2901/CVE-2015-7704.
74* [Bug 2954] Version 4.2.8p4 crashes on startup on some OSes.
75  - fixed data race conditions in threaded DNS worker. perlinger@ntp.org
76  - limit threading warm-up to linux; FreeBSD bombs on it. perlinger@ntp.org
77* [Bug 2957] 'unsigned int' vs 'size_t' format clash. perlinger@ntp.org
78  - accept key file only if there are no parsing errors
79  - fixed size_t/u_int format clash
80  - fixed wrong use of 'strlcpy'
81* [Bug 2958] ntpq: fatal error messages need a final newline. Craig Leres.
82* [Bug 2962] truncation of size_t/ptrdiff_t on 64bit targets. perlinger@ntp.org
83  - fixed several other warnings (cast-alignment, missing const, missing prototypes)
84  - promote use of 'size_t' for values that express a size
85  - use ptr-to-const for read-only arguments
86  - make sure SOCKET values are not truncated (win32-specific)
87  - format string fixes
88* [Bug 2965] Local clock didn't work since 4.2.8p4.  Martin Burnicki.
89* [Bug 2967] ntpdate command suffers an assertion failure
90  - fixed ntp_rfc2553.c to return proper address length. perlinger@ntp.org
91* [Bug 2969]  Seg fault from ntpq/mrulist when looking at server with
92              lots of clients. perlinger@ntp.org
93* [Bug 2971] ntpq bails on ^C: select fails: Interrupted system call
94  - changed stacked/nested handling of CTRL-C. perlinger@ntp.org
95* Unity cleanup for FreeBSD-6.4.  Harlan Stenn.
96* Unity test cleanup.  Harlan Stenn.
97* Libevent autoconf pthread fixes for FreeBSD-10.  Harlan Stenn.
98* Header cleanup in tests/sandbox/uglydate.c.  Harlan Stenn.
99* Header cleanup in tests/libntp/sfptostr.c.  Harlan Stenn.
100* Quiet a warning from clang.  Harlan Stenn.
101
102---
103NTP 4.2.8p4
104
105Focus: Security, Bug fixes, enhancements.
106
107Severity: MEDIUM
108
109In addition to bug fixes and enhancements, this release fixes the
110following 13 low- and medium-severity vulnerabilities:
111
112* Incomplete vallen (value length) checks in ntp_crypto.c, leading
113  to potential crashes or potential code injection/information leakage.
114
115    References: Sec 2899, Sec 2671, CVE-2015-7691, CVE-2015-7692, CVE-2015-7702
116    Affects: All ntp-4 releases up to, but not including 4.2.8p4,
117    	and 4.3.0 up to, but not including 4.3.77
118    CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6
119    Summary: The fix for CVE-2014-9750 was incomplete in that there were
120    	certain code paths where a packet with particular autokey operations
121	that contained malicious data was not always being completely
122	validated. Receipt of these packets can cause ntpd to crash.
123    Mitigation:
124        Don't use autokey.
125	Upgrade to 4.2.8p4, or later, from the NTP Project Download
126	    Page or the NTP Public Services Project Download Page
127	Monitor your ntpd instances. 
128	Credit: This weakness was discovered by Tenable Network Security. 
129
130* Clients that receive a KoD should validate the origin timestamp field.
131
132    References: Sec 2901 / CVE-2015-7704, CVE-2015-7705
133    Affects: All ntp-4 releases up to, but not including 4.2.8p4,
134	and 4.3.0 up to, but not including 4.3.77
135    CVSS: (AV:N/AC:M/Au:N/C:N/I:N/A:P) Base Score: 4.3-5.0 at worst
136    Summary: An ntpd client that honors Kiss-of-Death responses will honor
137    	KoD messages that have been forged by an attacker, causing it to
138	delay or stop querying its servers for time updates. Also, an
139	attacker can forge packets that claim to be from the target and
140	send them to servers often enough that a server that implements
141	KoD rate limiting will send the target machine a KoD response to
142	attempt to reduce the rate of incoming packets, or it may also
143	trigger a firewall block at the server for packets from the target
144	machine. For either of these attacks to succeed, the attacker must
145	know what servers the target is communicating with. An attacker
146	can be anywhere on the Internet and can frequently learn the
147	identity of the target's time source by sending the target a
148	time query.
149    Mitigation:
150        Implement BCP-38.
151	Upgrade to 4.2.8p4, or later, from the NTP Project Download Page
152	    or the NTP Public Services Project Download Page
153	If you can't upgrade, restrict who can query ntpd to learn who
154	    its servers are, and what IPs are allowed to ask your system
155	    for the time. This mitigation is heavy-handed.
156	Monitor your ntpd instances. 
157    Note:
158    	4.2.8p4 protects against the first attack. For the second attack,
159    	all we can do is warn when it is happening, which we do in 4.2.8p4.
160    Credit: This weakness was discovered by Aanchal Malhotra,
161    	Issac E. Cohen, and Sharon Goldberg of Boston University. 
162
163* configuration directives to change "pidfile" and "driftfile" should
164  only be allowed locally. 
165
166  References: Sec 2902 / CVE-2015-5196
167  Affects: All ntp-4 releases up to, but not including 4.2.8p4,
168	and 4.3.0 up to, but not including 4.3.77
169   CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.2 worst case
170   Summary: If ntpd is configured to allow for remote configuration,
171	and if the (possibly spoofed) source IP address is allowed to
172	send remote configuration requests, and if the attacker knows
173	the remote configuration password, it's possible for an attacker
174	to use the "pidfile" or "driftfile" directives to potentially
175	overwrite other files.
176   Mitigation:
177	Implement BCP-38.
178	Upgrade to 4.2.8p4, or later, from the NTP Project Download
179	    Page or the NTP Public Services Project Download Page
180	If you cannot upgrade, don't enable remote configuration.
181	If you must enable remote configuration and cannot upgrade,
182	    remote configuration of NTF's ntpd requires:
183	    - an explicitly configured trustedkey, and you should also
184	    	configure a controlkey.
185	    - access from a permitted IP. You choose the IPs.
186	    - authentication. Don't disable it. Practice secure key safety. 
187	Monitor your ntpd instances. 
188   Credit: This weakness was discovered by Miroslav Lichvar of Red Hat. 
189
190* Slow memory leak in CRYPTO_ASSOC 
191
192  References: Sec 2909 / CVE-2015-7701
193  Affects: All ntp-4 releases that use autokey up to, but not
194    including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77
195  CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 0.0 best/usual case,
196  	4.6 otherwise
197  Summary: If ntpd is configured to use autokey, then an attacker can
198	send packets to ntpd that will, after several days of ongoing
199	attack, cause it to run out of memory.
200  Mitigation:
201	Don't use autokey.
202	Upgrade to 4.2.8p4, or later, from the NTP Project Download
203	    Page or the NTP Public Services Project Download Page
204	Monitor your ntpd instances. 
205  Credit: This weakness was discovered by Tenable Network Security. 
206
207* mode 7 loop counter underrun
208
209  References:  Sec 2913 / CVE-2015-7848 / TALOS-CAN-0052
210  Affects: All ntp-4 releases up to, but not including 4.2.8p4,
211  	and 4.3.0 up to, but not including 4.3.77
212  CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6
213  Summary: If ntpd is configured to enable mode 7 packets, and if the
214	use of mode 7 packets is not properly protected thru the use of
215	the available mode 7 authentication and restriction mechanisms,
216	and if the (possibly spoofed) source IP address is allowed to
217	send mode 7 queries, then an attacker can send a crafted packet
218	to ntpd that will cause it to crash.
219  Mitigation:
220	Implement BCP-38.
221	Upgrade to 4.2.8p4, or later, from the NTP Project Download
222	    Page or the NTP Public Services Project Download Page.
223	      If you are unable to upgrade:
224	In ntp-4.2.8, mode 7 is disabled by default. Don't enable it.
225	If you must enable mode 7:
226	    configure the use of a requestkey to control who can issue
227		mode 7 requests.
228	    configure restrict noquery to further limit mode 7 requests
229		to trusted sources. 
230	Monitor your ntpd instances. 
231Credit: This weakness was discovered by Aleksandar Nikolic of Cisco Talos. 
232
233* memory corruption in password store
234
235  References: Sec 2916 / CVE-2015-7849 / TALOS-CAN-0054
236  Affects: All ntp-4 releases up to, but not including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77
237  CVSS: (AV:N/AC:H/Au:M/C:N/I:C/A:C) Base Score: 6.8, worst case
238  Summary: If ntpd is configured to allow remote configuration, and if
239	the (possibly spoofed) source IP address is allowed to send
240	remote configuration requests, and if the attacker knows the
241	remote configuration password or if ntpd was configured to
242	disable authentication, then an attacker can send a set of
243	packets to ntpd that may cause a crash or theoretically
244	perform a code injection attack.
245  Mitigation:
246	Implement BCP-38.
247	Upgrade to 4.2.8p4, or later, from the NTP Project Download
248	    Page or the NTP Public Services Project Download Page.
249	If you are unable to upgrade, remote configuration of NTF's
250	    ntpd requires:
251		an explicitly configured "trusted" key. Only configure
252			this if you need it.
253		access from a permitted IP address. You choose the IPs.
254		authentication. Don't disable it. Practice secure key safety. 
255	Monitor your ntpd instances. 
256  Credit: This weakness was discovered by Yves Younan of Cisco Talos. 
257
258* Infinite loop if extended logging enabled and the logfile and
259  keyfile are the same.
260
261    References: Sec 2917 / CVE-2015-7850 / TALOS-CAN-0055
262    Affects: All ntp-4 releases up to, but not including 4.2.8p4,
263	and 4.3.0 up to, but not including 4.3.77
264    CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case
265    Summary: If ntpd is configured to allow remote configuration, and if
266	the (possibly spoofed) source IP address is allowed to send
267	remote configuration requests, and if the attacker knows the
268	remote configuration password or if ntpd was configured to
269	disable authentication, then an attacker can send a set of
270	packets to ntpd that will cause it to crash and/or create a
271	potentially huge log file. Specifically, the attacker could
272	enable extended logging, point the key file at the log file,
273	and cause what amounts to an infinite loop.
274    Mitigation:
275	Implement BCP-38.
276	Upgrade to 4.2.8p4, or later, from the NTP Project Download
277	    Page or the NTP Public Services Project Download Page.
278	If you are unable to upgrade, remote configuration of NTF's ntpd
279	  requires:
280            an explicitly configured "trusted" key. Only configure this
281	    	if you need it.
282            access from a permitted IP address. You choose the IPs.
283            authentication. Don't disable it. Practice secure key safety. 
284        Monitor your ntpd instances. 
285    Credit: This weakness was discovered by Yves Younan of Cisco Talos. 
286
287* Potential path traversal vulnerability in the config file saving of
288  ntpd on VMS.
289
290  References: Sec 2918 / CVE-2015-7851 / TALOS-CAN-0062
291  Affects: All ntp-4 releases running under VMS up to, but not
292	including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77
293  CVSS: (AV:N/AC:H/Au:M/C:N/I:P/A:C) Base Score: 5.2, worst case
294  Summary: If ntpd is configured to allow remote configuration, and if
295	the (possibly spoofed) IP address is allowed to send remote
296	configuration requests, and if the attacker knows the remote
297	configuration password or if ntpd was configured to disable
298	authentication, then an attacker can send a set of packets to
299	ntpd that may cause ntpd to overwrite files.
300  Mitigation:
301	Implement BCP-38.
302	Upgrade to 4.2.8p4, or later, from the NTP Project Download
303	    Page or the NTP Public Services Project Download Page.
304	If you are unable to upgrade, remote configuration of NTF's ntpd
305	    requires:
306		an explicitly configured "trusted" key. Only configure
307			this if you need it.
308		access from permitted IP addresses. You choose the IPs.
309		authentication. Don't disable it. Practice key security safety. 
310        Monitor your ntpd instances. 
311    Credit: This weakness was discovered by Yves Younan of Cisco Talos. 
312
313* ntpq atoascii() potential memory corruption
314
315  References: Sec 2919 / CVE-2015-7852 / TALOS-CAN-0063
316  Affects: All ntp-4 releases running up to, but not including 4.2.8p4,
317	and 4.3.0 up to, but not including 4.3.77
318  CVSS: (AV:N/AC:H/Au:N/C:N/I:P/A:P) Base Score: 4.0, worst case
319  Summary: If an attacker can figure out the precise moment that ntpq
320	is listening for data and the port number it is listening on or
321	if the attacker can provide a malicious instance ntpd that
322	victims will connect to then an attacker can send a set of
323	crafted mode 6 response packets that, if received by ntpq,
324	can cause ntpq to crash.
325  Mitigation:
326	Implement BCP-38.
327	Upgrade to 4.2.8p4, or later, from the NTP Project Download
328	    Page or the NTP Public Services Project Download Page.
329	If you are unable to upgrade and you run ntpq against a server
330	    and ntpq crashes, try again using raw mode. Build or get a
331	    patched ntpq and see if that fixes the problem. Report new
332	    bugs in ntpq or abusive servers appropriately.
333	If you use ntpq in scripts, make sure ntpq does what you expect
334	    in your scripts. 
335  Credit: This weakness was discovered by Yves Younan and
336  	Aleksander Nikolich of Cisco Talos. 
337
338* Invalid length data provided by a custom refclock driver could cause
339  a buffer overflow. 
340
341  References: Sec 2920 / CVE-2015-7853 / TALOS-CAN-0064
342  Affects: Potentially all ntp-4 releases running up to, but not
343	including 4.2.8p4, and 4.3.0 up to, but not including 4.3.77
344	that have custom refclocks
345  CVSS: (AV:L/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 usual case,
346	5.9 unusual worst case
347  Summary: A negative value for the datalen parameter will overflow a
348	data buffer. NTF's ntpd driver implementations always set this
349	value to 0 and are therefore not vulnerable to this weakness.
350	If you are running a custom refclock driver in ntpd and that
351	driver supplies a negative value for datalen (no custom driver
352	of even minimal competence would do this) then ntpd would
353	overflow a data buffer. It is even hypothetically possible
354	in this case that instead of simply crashing ntpd the attacker
355	could effect a code injection attack.
356  Mitigation:
357	Upgrade to 4.2.8p4, or later, from the NTP Project Download
358	    Page or the NTP Public Services Project Download Page.
359	If you are unable to upgrade:
360		If you are running custom refclock drivers, make sure
361			the signed datalen value is either zero or positive. 
362	Monitor your ntpd instances. 
363  Credit: This weakness was discovered by Yves Younan of Cisco Talos. 
364
365* Password Length Memory Corruption Vulnerability
366
367  References: Sec 2921 / CVE-2015-7854 / TALOS-CAN-0065
368  Affects: All ntp-4 releases up to, but not including 4.2.8p4, and
369  	4.3.0 up to, but not including 4.3.77
370  CVSS: (AV:N/AC:H/Au:M/C:C/I:C/A:C) Base Score: 0.0 best case,
371  	1.7 usual case, 6.8, worst case
372  Summary: If ntpd is configured to allow remote configuration, and if
373	the (possibly spoofed) source IP address is allowed to send
374	remote configuration requests, and if the attacker knows the
375	remote configuration password or if ntpd was (foolishly)
376	configured to disable authentication, then an attacker can
377	send a set of packets to ntpd that may cause it to crash,
378	with the hypothetical possibility of a small code injection.
379  Mitigation:
380	Implement BCP-38.
381	Upgrade to 4.2.8p4, or later, from the NTP Project Download
382	    Page or the NTP Public Services Project Download Page.
383	If you are unable to upgrade, remote configuration of NTF's
384	    ntpd requires:
385		an explicitly configured "trusted" key. Only configure
386			this if you need it.
387		access from a permitted IP address. You choose the IPs.
388		authentication. Don't disable it. Practice secure key safety. 
389	Monitor your ntpd instances. 
390  Credit: This weakness was discovered by Yves Younan and
391  	Aleksander Nikolich of Cisco Talos. 
392
393* decodenetnum() will ASSERT botch instead of returning FAIL on some
394  bogus values.
395
396  References: Sec 2922 / CVE-2015-7855
397  Affects: All ntp-4 releases up to, but not including 4.2.8p4, and
398	4.3.0 up to, but not including 4.3.77
399  CVSS: (AV:N/AC:H/Au:M/C:N/I:N/A:C) Base Score: 4.6, worst case
400  Summary: If ntpd is fed a crafted mode 6 or mode 7 packet containing
401	an unusually long data value where a network address is expected,
402	the decodenetnum() function will abort with an assertion failure
403	instead of simply returning a failure condition.
404  Mitigation:
405	Implement BCP-38.
406	Upgrade to 4.2.8p4, or later, from the NTP Project Download
407	    Page or the NTP Public Services Project Download Page.
408	If you are unable to upgrade:
409		mode 7 is disabled by default. Don't enable it.
410		Use restrict noquery to limit who can send mode 6
411			and mode 7 requests.
412		Configure and use the controlkey and requestkey
413			authentication directives to limit who can
414			send mode 6 and mode 7 requests. 
415	Monitor your ntpd instances. 
416  Credit: This weakness was discovered by John D "Doug" Birdwell of IDA.org. 
417
418* NAK to the Future: Symmetric association authentication bypass via
419  crypto-NAK.
420
421  References: Sec 2941 / CVE-2015-7871
422  Affects: All ntp-4 releases between 4.2.5p186 up to but not including
423  	4.2.8p4, and 4.3.0 up to but not including 4.3.77
424  CVSS: (AV:N/AC:L/Au:N/C:N/I:P/A:P) Base Score: 6.4
425  Summary: Crypto-NAK packets can be used to cause ntpd to accept time
426	from unauthenticated ephemeral symmetric peers by bypassing the
427	authentication required to mobilize peer associations. This
428	vulnerability appears to have been introduced in ntp-4.2.5p186
429	when the code handling mobilization of new passive symmetric
430	associations (lines 1103-1165) was refactored.
431  Mitigation:
432	Implement BCP-38.
433	Upgrade to 4.2.8p4, or later, from the NTP Project Download
434	    Page or the NTP Public Services Project Download Page.
435	If you are unable to upgrade:
436		Apply the patch to the bottom of the "authentic" check
437			block around line 1136 of ntp_proto.c. 
438	Monitor your ntpd instances. 
439  Credit: This weakness was discovered by Stephen Gray <stepgray@cisco.com>. 
440
441Backward-Incompatible changes:
442* [Bug 2817] Default on Linux is now "rlimit memlock -1".
443  While the general default of 32M is still the case, under Linux
444  the default value has been changed to -1 (do not lock ntpd into
445  memory).  A value of 0 means "lock ntpd into memory with whatever
446  memory it needs." If your ntp.conf file has an explicit "rlimit memlock"
447  value in it, that value will continue to be used.
448
449* [Bug 2886] Misspelling: "outlyer" should be "outlier".
450  If you've written a script that looks for this case in, say, the
451  output of ntpq, you probably want to change your regex matches
452  from 'outlyer' to 'outl[iy]er'.
453
454New features in this release:
455* 'rlimit memlock' now has finer-grained control.  A value of -1 means
456  "don't lock ntpd into memore".  This is the default for Linux boxes.
457  A value of 0 means "lock ntpd into memory" with no limits.  Otherwise
458  the value is the number of megabytes of memory to lock.  The default
459  is 32 megabytes.
460
461* The old Google Test framework has been replaced with a new framework,
462  based on http://www.throwtheswitch.org/unity/ .
463
464Bug Fixes and Improvements:
465* [Bug 2332] (reopened) Exercise thread cancellation once before dropping
466  privileges and limiting resources in NTPD removes the need to link
467  forcefully against 'libgcc_s' which does not always work. J.Perlinger
468* [Bug 2595] ntpdate man page quirks.  Hal Murray, Harlan Stenn.
469* [Bug 2625] Deprecate flag1 in local refclock.  Hal Murray, Harlan Stenn.
470* [Bug 2817] Stop locking ntpd into memory by default under Linux.  H.Stenn.
471* [Bug 2821] minor build issues: fixed refclock_gpsdjson.c.  perlinger@ntp.org
472* [Bug 2823] ntpsweep with recursive peers option doesn't work.  H.Stenn.
473* [Bug 2849] Systems with more than one default route may never
474  synchronize.  Brian Utterback.  Note that this patch might need to
475  be reverted once Bug 2043 has been fixed.
476* [Bug 2864] 4.2.8p3 fails to compile on Windows. Juergen Perlinger
477* [Bug 2866] segmentation fault at initgroups().  Harlan Stenn.
478* [Bug 2867] ntpd with autokey active crashed by 'ntpq -crv'. J.Perlinger
479* [Bug 2873] libevent should not include .deps/ in the tarball.  H.Stenn
480* [Bug 2874] Don't distribute generated sntp/tests/fileHandlingTest.h. H.Stenn
481* [Bug 2875] sntp/Makefile.am: Get rid of DIST_SUBDIRS.  libevent must
482  be configured for the distribution targets.  Harlan Stenn.
483* [Bug 2883] ntpd crashes on exit with empty driftfile.  Miroslav Lichvar.
484* [Bug 2886] Mis-spelling: "outlyer" should be "outlier".  dave@horsfall.org
485* [Bug 2888] streamline calendar functions.  perlinger@ntp.org
486* [Bug 2889] ntp-dev-4.3.67 does not build on Windows.  perlinger@ntp.org
487* [Bug 2890] Ignore ENOBUFS on routing netlink socket.  Konstantin Khlebnikov.
488* [Bug 2906] make check needs better support for pthreads.  Harlan Stenn.
489* [Bug 2907] dist* build targets require our libevent/ to be enabled.  HStenn.
490* [Bug 2912] no munlockall() under Windows.  David Taylor, Harlan Stenn.
491* libntp/emalloc.c: Remove explicit include of stdint.h.  Harlan Stenn.
492* Put Unity CPPFLAGS items in unity_config.h.  Harlan Stenn.
493* tests/ntpd/g_leapsec.cpp typo fix.  Harlan Stenn.
494* Phase 1 deprecation of google test in sntp/tests/.  Harlan Stenn.
495* On some versions of HP-UX, inttypes.h does not include stdint.h.  H.Stenn.
496* top_srcdir can change based on ntp v. sntp.  Harlan Stenn.
497* sntp/tests/ function parameter list cleanup.  Damir Tomi��.
498* tests/libntp/ function parameter list cleanup.  Damir Tomi��.
499* tests/ntpd/ function parameter list cleanup.  Damir Tomi��.
500* sntp/unity/unity_config.h: handle stdint.h.  Harlan Stenn.
501* sntp/unity/unity_internals.h: handle *INTPTR_MAX on old Solaris.  H.Stenn.
502* tests/libntp/timevalops.c and timespecops.c fixed error printing.  D.Tomi��.
503* tests/libntp/ improvements in code and fixed error printing.  Damir Tomi��.
504* tests/libntp: a_md5encrypt.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c,
505  caltontp.c, clocktime.c, humandate.c, hextolfp.c, decodenetnum.c - fixed
506  formatting; first declaration, then code (C90); deleted unnecessary comments;
507  changed from sprintf to snprintf; fixed order of includes. Tomasz Flendrich
508* tests/libntp/lfpfunc.c remove unnecessary include, remove old comments,
509  fix formatting, cleanup. Tomasz Flendrich
510* tests/libntp/lfptostr.c remove unnecessary include, add consts, fix formatting.
511  Tomasz Flendrich
512* tests/libntp/statestr.c remove empty functions, remove unnecessary include,
513  fix formatting. Tomasz Flendrich
514* tests/libntp/modetoa.c fixed formatting. Tomasz Flendrich
515* tests/libntp/msyslog.c fixed formatting. Tomasz Flendrich
516* tests/libntp/numtoa.c deleted unnecessary empty functions, fixed formatting.
517  Tomasz Flendrich
518* tests/libntp/numtohost.c added const, fixed formatting. Tomasz Flendrich
519* tests/libntp/refnumtoa.c fixed formatting. Tomasz Flendrich
520* tests/libntp/ssl_init.c fixed formatting. Tomasz Flendrich
521* tests/libntp/tvtots.c fixed a bug, fixed formatting. Tomasz Flendrich
522* tests/libntp/uglydate.c removed an unnecessary include. Tomasz Flendrich
523* tests/libntp/vi64ops.c removed an unnecessary comment, fixed formatting.
524* tests/libntp/ymd3yd.c removed an empty function and an unnecessary include,
525fixed formatting. Tomasz Flendrich
526* tests/libntp/timespecops.c fixed formatting, fixed the order of includes,
527  removed unnecessary comments, cleanup. Tomasz Flendrich
528* tests/libntp/timevalops.c fixed the order of includes, deleted unnecessary
529  comments, cleanup. Tomasz Flendrich
530* tests/libntp/sockaddrtest.h making it agree to NTP's conventions of formatting.
531  Tomasz Flendrich
532* tests/libntp/lfptest.h cleanup. Tomasz Flendrich
533* tests/libntp/test-libntp.c fix formatting. Tomasz Flendrich
534* sntp/tests/crypto.c is now using proper Unity's assertions, fixed formatting.
535  Tomasz Flendrich
536* sntp/tests/kodDatabase.c added consts, deleted empty function,
537  fixed formatting. Tomasz Flendrich
538* sntp/tests/kodFile.c cleanup, fixed formatting. Tomasz Flendrich
539* sntp/tests/packetHandling.c is now using proper Unity's assertions,
540  fixed formatting, deleted unused variable. Tomasz Flendrich
541* sntp/tests/keyFile.c is now using proper Unity's assertions, fixed formatting.
542  Tomasz Flendrich
543* sntp/tests/packetProcessing.c changed from sprintf to snprintf,
544  fixed formatting. Tomasz Flendrich
545* sntp/tests/utilities.c is now using proper Unity's assertions, changed
546  the order of includes, fixed formatting, removed unnecessary comments.
547  Tomasz Flendrich
548* sntp/tests/sntptest.h fixed formatting. Tomasz Flendrich
549* sntp/tests/fileHandlingTest.h.in fixed a possible buffer overflow problem,
550  made one function do its job, deleted unnecessary prints, fixed formatting.
551  Tomasz Flendrich
552* sntp/unity/Makefile.am added a missing header. Tomasz Flendrich
553* sntp/unity/unity_config.h: Distribute it.  Harlan Stenn.
554* sntp/libevent/evconfig-private.h: remove generated filefrom SCM.  H.Stenn.
555* sntp/unity/Makefile.am: fix some broken paths.  Harlan Stenn.
556* sntp/unity/unity.c: Clean up a printf().  Harlan Stenn.
557* Phase 1 deprecation of google test in tests/libntp/.  Harlan Stenn.
558* Don't build sntp/libevent/sample/.  Harlan Stenn.
559* tests/libntp/test_caltontp needs -lpthread.  Harlan Stenn.
560* br-flock: --enable-local-libevent.  Harlan Stenn.
561* Wrote tests for ntpd/ntp_prio_q.c. Tomasz Flendrich
562* scripts/lib/NTP/Util.pm: stratum output is version-dependent.  Harlan Stenn.
563* Get rid of the NTP_ prefix on our assertion macros.  Harlan Stenn.
564* Code cleanup.  Harlan Stenn.
565* libntp/icom.c: Typo fix.  Harlan Stenn.
566* util/ntptime.c: initialization nit.  Harlan Stenn.
567* ntpd/ntp_peer.c:newpeer(): added a DEBUG_REQUIRE(srcadr).  Harlan Stenn.
568* Add std_unity_tests to various Makefile.am files.  Harlan Stenn.
569* ntpd/ntp_restrict.c: added a few assertions, created tests for this file.
570  Tomasz Flendrich
571* Changed progname to be const in many files - now it's consistent. Tomasz
572  Flendrich
573* Typo fix for GCC warning suppression.  Harlan Stenn.
574* Added tests/ntpd/ntp_scanner.c test. Damir Tomi��.
575* Added declarations to all Unity tests, and did minor fixes to them.
576  Reduced the number of warnings by half. Damir Tomi��.
577* Updated generate_test_runner.rb and updated the sntp/unity/auto directory
578  with the latest Unity updates from Mark. Damir Tomi��.
579* Retire google test - phase I.  Harlan Stenn.
580* Unity test cleanup: move declaration of 'initializing'.  Harlan Stenn.
581* Update the NEWS file.  Harlan Stenn.
582* Autoconf cleanup.  Harlan Stenn.
583* Unit test dist cleanup. Harlan Stenn.
584* Cleanup various test Makefile.am files.  Harlan Stenn.
585* Pthread autoconf macro cleanup.  Harlan Stenn.
586* Fix progname definition in unity runner scripts.  Harlan Stenn.
587* Clean trailing whitespace in tests/ntpd/Makefile.am.  Harlan Stenn.
588* Update the patch for bug 2817.  Harlan Stenn.
589* More updates for bug 2817.  Harlan Stenn.
590* Fix bugs in tests/ntpd/ntp_prio_q.c.  Harlan Stenn.
591* gcc on older HPUX may need +allowdups.  Harlan Stenn.
592* Adding missing MCAST protection.  Harlan Stenn.
593* Disable certain test programs on certain platforms.  Harlan Stenn.
594* Implement --enable-problem-tests (on by default).  Harlan Stenn.
595* build system tweaks.  Harlan Stenn.
596
597---
598NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29) 
599
600Focus: 1 Security fix.  Bug fixes and enhancements.  Leap-second improvements.
601
602Severity: MEDIUM
603
604Security Fix:
605
606* [Sec 2853] Crafted remote config packet can crash some versions of
607  ntpd.  Aleksis Kauppinen, Juergen Perlinger, Harlan Stenn.
608
609Under specific circumstances an attacker can send a crafted packet to
610cause a vulnerable ntpd instance to crash. This requires each of the
611following to be true:
612
6131) ntpd set up to allow remote configuration (not allowed by default), and
6142) knowledge of the configuration password, and
6153) access to a computer entrusted to perform remote configuration. 
616
617This vulnerability is considered low-risk.
618
619New features in this release:
620
621Optional (disabled by default) support to have ntpd provide smeared
622leap second time.  A specially built and configured ntpd will only
623offer smeared time in response to client packets.  These response
624packets will also contain a "refid" of 254.a.b.c, where the 24 bits
625of a, b, and c encode the amount of smear in a 2:22 integer:fraction 
626format.  See README.leapsmear and http://bugs.ntp.org/2855 for more
627information.
628
629   *IF YOU CHOOSE TO CONFIGURE NTPD TO PROVIDE LEAP SMEAR TIME*
630   *BE SURE YOU DO NOT OFFER THAT TIME ON PUBLIC TIMESERVERS.*
631
632We've imported the Unity test framework, and have begun converting
633the existing google-test items to this new framework.  If you want
634to write new tests or change old ones, you'll need to have ruby
635installed.  You don't need ruby to run the test suite.
636
637Bug Fixes and Improvements:
638
639* CID 739725: Fix a rare resource leak in libevent/listener.c.
640* CID 1295478: Quiet a pedantic potential error from the fix for Bug 2776.
641* CID 1296235: Fix refclock_jjy.c and correcting type of the driver40-ja.html
642* CID 1269537: Clean up a line of dead code in getShmTime().
643* [Bug 1060] Buffer overruns in libparse/clk_rawdcf.c.  Helge Oldach.
644* [Bug 2590] autogen-5.18.5.
645* [Bug 2612] restrict: Warn when 'monitor' can't be disabled because
646  of 'limited'.
647* [Bug 2650] fix includefile processing.
648* [Bug 2745] ntpd -x steps clock on leap second
649   Fixed an initial-value problem that caused misbehaviour in absence of
650   any leapsecond information.
651   Do leap second stepping only of the step adjustment is beyond the
652   proper jump distance limit and step correction is allowed at all.
653* [Bug 2750] build for Win64
654  Building for 32bit of loopback ppsapi needs def file
655* [Bug 2776] Improve ntpq's 'help keytype'.
656* [Bug 2778] Implement "apeers"  ntpq command to include associd.
657* [Bug 2782] Refactor refclock_shm.c, add memory barrier protection.
658* [Bug 2792] If the IFF_RUNNING interface flag is supported then an
659  interface is ignored as long as this flag is not set since the
660  interface is not usable (e.g., no link).
661* [Bug 2794] Clean up kernel clock status reports.
662* [Bug 2800] refclock_true.c true_debug() can't open debug log because
663  of incompatible open/fdopen parameters.
664* [Bug 2804] install-local-data assumes GNU 'find' semantics.
665* [Bug 2805] ntpd fails to join multicast group.
666* [Bug 2806] refclock_jjy.c supports the Telephone JJY.
667* [Bug 2808] GPSD_JSON driver enhancements, step 1.
668  Fix crash during cleanup if GPS device not present and char device.
669  Increase internal token buffer to parse all JSON data, even SKY.
670  Defer logging of errors during driver init until the first unit is
671  started, so the syslog is not cluttered when the driver is not used.
672  Various improvements, see http://bugs.ntp.org/2808 for details.
673  Changed libjsmn to a more recent version.
674* [Bug 2810] refclock_shm.c memory barrier code needs tweaks for QNX.
675* [Bug 2813] HP-UX needs -D__STDC_VERSION__=199901L and limits.h.
676* [Bug 2815] net-snmp before v5.4 has circular library dependencies.
677* [Bug 2821] Add a missing NTP_PRINTF and a missing const.
678* [Bug 2822] New leap column in sntp broke NTP::Util.pm.
679* [Bug 2824] Convert update-leap to perl. (also see 2769)
680* [Bug 2825] Quiet file installation in html/ .
681* [Bug 2830] ntpd doesn't always transfer the correct TAI offset via autokey
682   NTPD transfers the current TAI (instead of an announcement) now.
683   This might still needed improvement.
684   Update autokey data ASAP when 'sys_tai' changes.
685   Fix unit test that was broken by changes for autokey update.
686   Avoid potential signature length issue and use DPRINTF where possible
687     in ntp_crypto.c.
688* [Bug 2832] refclock_jjy.c supports the TDC-300.
689* [Bug 2834] Correct a broken html tag in html/refclock.html
690* [Bug 2836] DFC77 patches from Frank Kardel to make decoding more
691  robust, and require 2 consecutive timestamps to be consistent.
692* [Bug 2837] Allow a configurable DSCP value.
693* [Bug 2837] add test for DSCP to ntpd/complete.conf.in
694* [Bug 2842] Glitch in ntp.conf.def documentation stanza.
695* [Bug 2842] Bug in mdoc2man.
696* [Bug 2843] make check fails on 4.3.36
697   Fixed compiler warnings about numeric range overflow
698   (The original topic was fixed in a byplay to bug#2830)
699* [Bug 2845] Harden memory allocation in ntpd.
700* [Bug 2852] 'make check' can't find unity.h.  Hal Murray.
701* [Bug 2854] Missing brace in libntp/strdup.c.  Masanari Iida.
702* [Bug 2855] Parser fix for conditional leap smear code.  Harlan Stenn.
703* [Bug 2855] Report leap smear in the REFID.  Harlan Stenn.
704* [Bug 2855] Implement conditional leap smear code.  Martin Burnicki.
705* [Bug 2856] ntpd should wait() on terminated child processes.  Paul Green.
706* [Bug 2857] Stratus VOS does not support SIGIO.  Paul Green.
707* [Bug 2859] Improve raw DCF77 robustness deconding.  Frank Kardel.
708* [Bug 2860] ntpq ifstats sanity check is too stringent.  Frank Kardel.
709* html/drivers/driver22.html: typo fix.  Harlan Stenn.
710* refidsmear test cleanup.  Tomasz Flendrich.
711* refidsmear function support and tests.  Harlan Stenn.
712* sntp/tests/Makefile.am: remove g_nameresolution.cpp as it tested
713  something that was only in the 4.2.6 sntp.  Harlan Stenn.
714* Modified tests/bug-2803/Makefile.am so it builds Unity framework tests.
715  Damir Tomi��
716* Modified tests/libtnp/Makefile.am so it builds Unity framework tests.
717  Damir Tomi��
718* Modified sntp/tests/Makefile.am so it builds Unity framework tests.
719  Damir Tomi��
720* tests/sandbox/smeartest.c: Harlan Stenn, Damir Tomic, Juergen Perlinger.
721* Converted from gtest to Unity: tests/bug-2803/. Damir Tomi��
722* Converted from gtest to Unity: tests/libntp/ a_md5encrypt, atoint.c,
723  atouint.c, authkeys.c, buftvtots.c, calendar.c, caljulian.c,
724  calyearstart.c, clocktime.c, hextoint.c, lfpfunc.c, modetoa.c,
725  numtoa.c, numtohost.c, refnumtoa.c, ssl_init.c, statestr.c,
726  timespecops.c, timevalops.c, uglydate.c, vi64ops.c, ymd2yd.c.
727  Damir Tomi��
728* Converted from gtest to Unity: sntp/tests/ kodDatabase.c, kodFile.c,
729  networking.c, keyFile.c, utilities.cpp, sntptest.h,
730  fileHandlingTest.h. Damir Tomi��
731* Initial support for experimental leap smear code.  Harlan Stenn.
732* Fixes to sntp/tests/fileHandlingTest.h.in.  Harlan Stenn.
733* Report select() debug messages at debug level 3 now.
734* sntp/scripts/genLocInfo: treat raspbian as debian.
735* Unity test framework fixes.
736  ** Requires ruby for changes to tests.
737* Initial support for PACKAGE_VERSION tests.
738* sntp/libpkgver belongs in EXTRA_DIST, not DIST_SUBDIRS.
739* tests/bug-2803/Makefile.am must distribute bug-2803.h.
740* Add an assert to the ntpq ifstats code.
741* Clean up the RLIMIT_STACK code.
742* Improve the ntpq documentation around the controlkey keyid.
743* ntpq.c cleanup.
744* Windows port build cleanup.
745
746---
747NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/07) 
748
749Focus: Security and Bug fixes, enhancements.
750
751Severity: MEDIUM
752 
753In addition to bug fixes and enhancements, this release fixes the
754following medium-severity vulnerabilities involving private key
755authentication:
756
757* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
758
759    References: Sec 2779 / CVE-2015-1798 / VU#374268
760    Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not
761	including ntp-4.2.8p2 where the installation uses symmetric keys
762	to authenticate remote associations.
763    CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
764    Date Resolved: Stable (4.2.8p2) 07 Apr 2015
765    Summary: When ntpd is configured to use a symmetric key to authenticate
766	a remote NTP server/peer, it checks if the NTP message
767	authentication code (MAC) in received packets is valid, but not if
768	there actually is any MAC included. Packets without a MAC are
769	accepted as if they had a valid MAC. This allows a MITM attacker to
770	send false packets that are accepted by the client/peer without
771	having to know the symmetric key. The attacker needs to know the
772	transmit timestamp of the client to match it in the forged reply
773	and the false reply needs to reach the client before the genuine
774	reply from the server. The attacker doesn't necessarily need to be
775	relaying the packets between the client and the server.
776
777	Authentication using autokey doesn't have this problem as there is
778	a check that requires the key ID to be larger than NTP_MAXKEY,
779	which fails for packets without a MAC.
780    Mitigation:
781        Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
782	or the NTP Public Services Project Download Page
783        Configure ntpd with enough time sources and monitor it properly. 
784    Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 
785
786* [Sec 2781] Authentication doesn't protect symmetric associations against
787  DoS attacks.
788
789    References: Sec 2781 / CVE-2015-1799 / VU#374268
790    Affects: All NTP releases starting with at least xntp3.3wy up to but
791	not including ntp-4.2.8p2 where the installation uses symmetric
792	key authentication.
793    CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
794    Note: the CVSS base Score for this issue could be 4.3 or lower, and
795	it could be higher than 5.4.
796    Date Resolved: Stable (4.2.8p2) 07 Apr 2015
797    Summary: An attacker knowing that NTP hosts A and B are peering with
798	each other (symmetric association) can send a packet to host A
799	with source address of B which will set the NTP state variables
800	on A to the values sent by the attacker. Host A will then send
801	on its next poll to B a packet with originate timestamp that
802	doesn't match the transmit timestamp of B and the packet will
803	be dropped. If the attacker does this periodically for both
804	hosts, they won't be able to synchronize to each other. This is
805	a known denial-of-service attack, described at
806	https://www.eecis.udel.edu/~mills/onwire.html .
807
808	According to the document the NTP authentication is supposed to
809	protect symmetric associations against this attack, but that
810	doesn't seem to be the case. The state variables are updated even
811	when authentication fails and the peers are sending packets with
812	originate timestamps that don't match the transmit timestamps on
813	the receiving side.
814
815	This seems to be a very old problem, dating back to at least
816	xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905)
817	specifications, so other NTP implementations with support for
818	symmetric associations and authentication may be vulnerable too.
819	An update to the NTP RFC to correct this error is in-process.
820    Mitigation:
821        Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
822	or the NTP Public Services Project Download Page
823        Note that for users of autokey, this specific style of MITM attack
824	is simply a long-known potential problem.
825        Configure ntpd with appropriate time sources and monitor ntpd.
826	Alert your staff if problems are detected. 
827    Credit: This issue was discovered by Miroslav Lichvar, of Red Hat. 
828
829* New script: update-leap
830The update-leap script will verify and if necessary, update the
831leap-second definition file.
832It requires the following commands in order to work:
833
834	wget logger tr sed shasum
835
836Some may choose to run this from cron.  It needs more portability testing.
837
838Bug Fixes and Improvements:
839
840* [Bug 1787] DCF77's formerly "antenna" bit is "call bit" since 2003.
841* [Bug 1960] setsockopt IPV6_MULTICAST_IF: Invalid argument.
842* [Bug 2346] "graceful termination" signals do not do peer cleanup.
843* [Bug 2728] See if C99-style structure initialization works.
844* [Bug 2747] Upgrade libevent to 2.1.5-beta.
845* [Bug 2749] ntp/lib/NTP/Util.pm needs update for ntpq -w, IPv6, .POOL. .
846* [Bug 2751] jitter.h has stale copies of l_fp macros.
847* [Bug 2756] ntpd hangs in startup with gcc 3.3.5 on ARM.
848* [Bug 2757] Quiet compiler warnings.
849* [Bug 2759] Expose nonvolatile/clk_wander_threshold to ntpq.
850* [Bug 2763] Allow different thresholds for forward and backward steps.
851* [Bug 2766] ntp-keygen output files should not be world-readable.
852* [Bug 2767] ntp-keygen -M should symlink to ntp.keys.
853* [Bug 2771] nonvolatile value is documented in wrong units.
854* [Bug 2773] Early leap announcement from Palisade/Thunderbolt
855* [Bug 2774] Unreasonably verbose printout - leap pending/warning
856* [Bug 2775] ntp-keygen.c fails to compile under Windows.
857* [Bug 2777] Fixed loops and decoding of Meinberg GPS satellite info.
858  Removed non-ASCII characters from some copyright comments.
859  Removed trailing whitespace.
860  Updated definitions for Meinberg clocks from current Meinberg header files.
861  Now use C99 fixed-width types and avoid non-ASCII characters in comments.
862  Account for updated definitions pulled from Meinberg header files.
863  Updated comments on Meinberg GPS receivers which are not only called GPS16x.
864  Replaced some constant numbers by defines from ntp_calendar.h
865  Modified creation of parse-specific variables for Meinberg devices
866  in gps16x_message().
867  Reworked mk_utcinfo() to avoid printing of ambiguous leap second dates.
868  Modified mbg_tm_str() which now expexts an additional parameter controlling
869  if the time status shall be printed.
870* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
871* [Sec 2781] Authentication doesn't protect symmetric associations against
872  DoS attacks.
873* [Bug 2783] Quiet autoconf warnings about missing AC_LANG_SOURCE.
874* [Bug 2789] Quiet compiler warnings from libevent.
875* [Bug 2790] If ntpd sets the Windows MM timer highest resolution
876  pause briefly before measuring system clock precision to yield
877  correct results.
878* Comment from Juergen Perlinger in ntp_calendar.c to make the code clearer.
879* Use predefined function types for parse driver functions
880  used to set up function pointers.
881  Account for changed prototype of parse_inp_fnc_t functions.
882  Cast parse conversion results to appropriate types to avoid
883  compiler warnings.
884  Let ioctl() for Windows accept a (void *) to avoid compiler warnings
885  when called with pointers to different types.
886
887---
888NTP 4.2.8p1 (Harlan Stenn <stenn@ntp.org>, 2015/02/04) 
889
890Focus: Security and Bug fixes, enhancements.
891
892Severity: HIGH
893 
894In addition to bug fixes and enhancements, this release fixes the
895following high-severity vulnerabilities:
896
897* vallen is not validated in several places in ntp_crypto.c, leading
898  to a potential information leak or possibly a crash
899
900    References: Sec 2671 / CVE-2014-9297 / VU#852879
901    Affects: All NTP4 releases before 4.2.8p1 that are running autokey.
902    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
903    Date Resolved: Stable (4.2.8p1) 04 Feb 2015
904    Summary: The vallen packet value is not validated in several code
905             paths in ntp_crypto.c which can lead to information leakage
906	     or perhaps a crash of the ntpd process.
907    Mitigation - any of:
908	Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
909		or the NTP Public Services Project Download Page.
910	Disable Autokey Authentication by removing, or commenting out,
911		all configuration directives beginning with the "crypto"
912		keyword in your ntp.conf file. 
913    Credit: This vulnerability was discovered by Stephen Roettger of the
914    	Google Security Team, with additional cases found by Sebastian
915	Krahmer of the SUSE Security Team and Harlan Stenn of Network
916	Time Foundation. 
917
918* ::1 can be spoofed on some OSes, so ACLs based on IPv6 ::1 addresses
919  can be bypassed.
920
921    References: Sec 2672 / CVE-2014-9298 / VU#852879
922    Affects: All NTP4 releases before 4.2.8p1, under at least some
923	versions of MacOS and Linux. *BSD has not been seen to be vulnerable.
924    CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:C) Base Score: 9
925    Date Resolved: Stable (4.2.8p1) 04 Feb 2014
926    Summary: While available kernels will prevent 127.0.0.1 addresses
927	from "appearing" on non-localhost IPv4 interfaces, some kernels
928	do not offer the same protection for ::1 source addresses on
929	IPv6 interfaces. Since NTP's access control is based on source
930	address and localhost addresses generally have no restrictions,
931	an attacker can send malicious control and configuration packets
932	by spoofing ::1 addresses from the outside. Note Well: This is
933	not really a bug in NTP, it's a problem with some OSes. If you
934	have one of these OSes where ::1 can be spoofed, ALL ::1 -based
935	ACL restrictions on any application can be bypassed!
936    Mitigation:
937        Upgrade to 4.2.8p1, or later, from the NTP Project Download Page
938	or the NTP Public Services Project Download Page
939        Install firewall rules to block packets claiming to come from
940	::1 from inappropriate network interfaces. 
941    Credit: This vulnerability was discovered by Stephen Roettger of
942	the Google Security Team. 
943
944Additionally, over 30 bugfixes and improvements were made to the codebase.
945See the ChangeLog for more information.
946
947---
948NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18) 
949 
950Focus: Security and Bug fixes, enhancements.
951 
952Severity: HIGH
953 
954In addition to bug fixes and enhancements, this release fixes the
955following high-severity vulnerabilities:
956
957************************** vv NOTE WELL vv *****************************
958
959The vulnerabilities listed below can be significantly mitigated by
960following the BCP of putting
961
962 restrict default ... noquery
963
964in the ntp.conf file.  With the exception of:
965
966   receive(): missing return on error
967   References: Sec 2670 / CVE-2014-9296 / VU#852879
968
969below (which is a limited-risk vulnerability), none of the recent
970vulnerabilities listed below can be exploited if the source IP is
971restricted from sending a 'query'-class packet by your ntp.conf file.
972
973************************** ^^ NOTE WELL ^^ *****************************
974
975* Weak default key in config_auth().
976
977  References: [Sec 2665] / CVE-2014-9293 / VU#852879
978  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
979  Vulnerable Versions: all releases prior to 4.2.7p11
980  Date Resolved: 28 Jan 2010
981
982  Summary: If no 'auth' key is set in the configuration file, ntpd
983	would generate a random key on the fly.  There were two
984	problems with this: 1) the generated key was 31 bits in size,
985	and 2) it used the (now weak) ntp_random() function, which was
986	seeded with a 32-bit value and could only provide 32 bits of
987	entropy.  This was sufficient back in the late 1990s when the
988	code was written.  Not today.
989
990  Mitigation - any of:
991	- Upgrade to 4.2.7p11 or later.
992	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
993
994  Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
995  	of the Google Security Team.
996
997* Non-cryptographic random number generator with weak seed used by
998  ntp-keygen to generate symmetric keys.
999
1000  References: [Sec 2666] / CVE-2014-9294 / VU#852879
1001  CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
1002  Vulnerable Versions: All NTP4 releases before 4.2.7p230
1003  Date Resolved: Dev (4.2.7p230) 01 Nov 2011
1004
1005  Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
1006  	prepare a random number generator that was of good quality back
1007	in the late 1990s. The random numbers produced was then used to
1008	generate symmetric keys. In ntp-4.2.8 we use a current-technology
1009	cryptographic random number generator, either RAND_bytes from
1010	OpenSSL, or arc4random(). 
1011
1012  Mitigation - any of:
1013  	- Upgrade to 4.2.7p230 or later.
1014	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
1015
1016  Credit:  This vulnerability was discovered in ntp-4.2.6 by
1017  	Stephen Roettger of the Google Security Team.
1018
1019* Buffer overflow in crypto_recv()
1020
1021  References: Sec 2667 / CVE-2014-9295 / VU#852879
1022  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
1023  Versions: All releases before 4.2.8
1024  Date Resolved: Stable (4.2.8) 18 Dec 2014
1025
1026  Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
1027  	file contains a 'crypto pw ...' directive) a remote attacker
1028	can send a carefully crafted packet that can overflow a stack
1029	buffer and potentially allow malicious code to be executed
1030	with the privilege level of the ntpd process.
1031
1032  Mitigation - any of:
1033  	- Upgrade to 4.2.8, or later, or
1034	- Disable Autokey Authentication by removing, or commenting out,
1035	  all configuration directives beginning with the crypto keyword
1036	  in your ntp.conf file. 
1037
1038  Credit: This vulnerability was discovered by Stephen Roettger of the
1039  	Google Security Team. 
1040
1041* Buffer overflow in ctl_putdata()
1042
1043  References: Sec 2668 / CVE-2014-9295 / VU#852879
1044  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
1045  Versions: All NTP4 releases before 4.2.8
1046  Date Resolved: Stable (4.2.8) 18 Dec 2014
1047
1048  Summary: A remote attacker can send a carefully crafted packet that
1049  	can overflow a stack buffer and potentially allow malicious
1050	code to be executed with the privilege level of the ntpd process.
1051
1052  Mitigation - any of:
1053  	- Upgrade to 4.2.8, or later.
1054	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
1055
1056  Credit: This vulnerability was discovered by Stephen Roettger of the
1057  	Google Security Team. 
1058
1059* Buffer overflow in configure()
1060
1061  References: Sec 2669 / CVE-2014-9295 / VU#852879
1062  CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
1063  Versions: All NTP4 releases before 4.2.8
1064  Date Resolved: Stable (4.2.8) 18 Dec 2014
1065
1066  Summary: A remote attacker can send a carefully crafted packet that
1067	can overflow a stack buffer and potentially allow malicious
1068	code to be executed with the privilege level of the ntpd process.
1069
1070  Mitigation - any of:
1071  	- Upgrade to 4.2.8, or later.
1072	- Follow BCP and put 'restrict ... noquery' in your ntp.conf file.
1073
1074  Credit: This vulnerability was discovered by Stephen Roettger of the
1075	Google Security Team. 
1076
1077* receive(): missing return on error
1078
1079  References: Sec 2670 / CVE-2014-9296 / VU#852879
1080  CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
1081  Versions: All NTP4 releases before 4.2.8
1082  Date Resolved: Stable (4.2.8) 18 Dec 2014
1083
1084  Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
1085  	the code path where an error was detected, which meant
1086	processing did not stop when a specific rare error occurred.
1087	We haven't found a way for this bug to affect system integrity.
1088	If there is no way to affect system integrity the base CVSS
1089	score for this bug is 0. If there is one avenue through which
1090	system integrity can be partially affected, the base score
1091	becomes a 5. If system integrity can be partially affected
1092	via all three integrity metrics, the CVSS base score become 7.5.
1093
1094  Mitigation - any of:
1095        - Upgrade to 4.2.8, or later,
1096        - Remove or comment out all configuration directives
1097	  beginning with the crypto keyword in your ntp.conf file. 
1098
1099  Credit: This vulnerability was discovered by Stephen Roettger of the
1100  	Google Security Team. 
1101
1102See http://support.ntp.org/security for more information.
1103
1104New features / changes in this release:
1105
1106Important Changes
1107
1108* Internal NTP Era counters
1109
1110The internal counters that track the "era" (range of years) we are in
1111rolls over every 136 years'.  The current "era" started at the stroke of
1112midnight on 1 Jan 1900, and ends just before the stroke of midnight on
11131 Jan 2036.
1114In the past, we have used the "midpoint" of the  range to decide which
1115era we were in.  Given the longevity of some products, it became clear
1116that it would be more functional to "look back" less, and "look forward"
1117more.  We now compile a timestamp into the ntpd executable and when we
1118get a timestamp we us the "built-on" to tell us what era we are in.
1119This check "looks back" 10 years, and "looks forward" 126 years.
1120
1121* ntpdc responses disabled by default
1122
1123Dave Hart writes:
1124
1125For a long time, ntpq and its mostly text-based mode 6 (control) 
1126protocol have been preferred over ntpdc and its mode 7 (private 
1127request) protocol for runtime queries and configuration.  There has 
1128been a goal of deprecating ntpdc, previously held back by numerous 
1129capabilities exposed by ntpdc with no ntpq equivalent.  I have been 
1130adding commands to ntpq to cover these cases, and I believe I've 
1131covered them all, though I've not compared command-by-command 
1132recently. 
1133
1134As I've said previously, the binary mode 7 protocol involves a lot of 
1135hand-rolled structure layout and byte-swapping code in both ntpd and 
1136ntpdc which is hard to get right.  As ntpd grows and changes, the 
1137changes are difficult to expose via ntpdc while maintaining forward 
1138and backward compatibility between ntpdc and ntpd.  In contrast, 
1139ntpq's text-based, label=value approach involves more code reuse and 
1140allows compatible changes without extra work in most cases. 
1141
1142Mode 7 has always been defined as vendor/implementation-specific while 
1143mode 6 is described in RFC 1305 and intended to be open to interoperate 
1144with other implementations.  There is an early draft of an updated 
1145mode 6 description that likely will join the other NTPv4 RFCs 
1146eventually. (http://tools.ietf.org/html/draft-odonoghue-ntpv4-control-01)
1147
1148For these reasons, ntpd 4.2.7p230 by default disables processing of 
1149ntpdc queries, reducing ntpd's attack surface and functionally 
1150deprecating ntpdc.  If you are in the habit of using ntpdc for certain 
1151operations, please try the ntpq equivalent.  If there's no equivalent, 
1152please open a bug report at http://bugs.ntp.org./
1153
1154In addition to the above, over 1100 issues have been resolved between
1155the 4.2.6 branch and 4.2.8.  The ChangeLog file in the distribution
1156lists these.
1157
1158--- 
1159NTP 4.2.6p5 (Harlan Stenn <stenn@ntp.org>, 2011/12/24) 
1160 
1161Focus: Bug fixes
1162 
1163Severity: Medium 
1164 
1165This is a recommended upgrade. 
1166
1167This release updates sys_rootdisp and sys_jitter calculations to match the
1168RFC specification, fixes a potential IPv6 address matching error for the
1169"nic" and "interface" configuration directives, suppresses the creation of
1170extraneous ephemeral associations for certain broadcastclient and
1171multicastclient configurations, cleans up some ntpq display issues, and
1172includes improvements to orphan mode, minor bugs fixes and code clean-ups.
1173
1174New features / changes in this release:
1175
1176ntpd
1177
1178 * Updated "nic" and "interface" IPv6 address handling to prevent 
1179   mismatches with localhost [::1] and wildcard [::] which resulted from
1180   using the address/prefix format (e.g. fe80::/64)
1181 * Fix orphan mode stratum incorrectly counting to infinity
1182 * Orphan parent selection metric updated to includes missing ntohl()
1183 * Non-printable stratum 16 refid no longer sent to ntp
1184 * Duplicate ephemeral associations suppressed for broadcastclient and
1185   multicastclient without broadcastdelay
1186 * Exclude undetermined sys_refid from use in loopback TEST12
1187 * Exclude MODE_SERVER responses from KoD rate limiting
1188 * Include root delay in clock_update() sys_rootdisp calculations
1189 * get_systime() updated to exclude sys_residual offset (which only
1190   affected bits "below" sys_tick, the precision threshold)
1191 * sys.peer jitter weighting corrected in sys_jitter calculation
1192
1193ntpq
1194
1195 * -n option extended to include the billboard "server" column
1196 * IPv6 addresses in the local column truncated to prevent overruns
1197
1198--- 
1199NTP 4.2.6p4 (Harlan Stenn <stenn@ntp.org>, 2011/09/22) 
1200 
1201Focus: Bug fixes and portability improvements 
1202 
1203Severity: Medium 
1204 
1205This is a recommended upgrade. 
1206 
1207This release includes build infrastructure updates, code 
1208clean-ups, minor bug fixes, fixes for a number of minor 
1209ref-clock issues, and documentation revisions. 
1210 
1211Portability improvements affect AIX, HP-UX, Linux, OS X and 64-bit time_t. 
1212 
1213New features / changes in this release: 
1214 
1215Build system 
1216 
1217* Fix checking for struct rtattr 
1218* Update config.guess and config.sub for AIX 
1219* Upgrade required version of autogen and libopts for building 
1220  from our source code repository 
1221 
1222ntpd 
1223 
1224* Back-ported several fixes for Coverity warnings from ntp-dev 
1225* Fix a rare boundary condition in UNLINK_EXPR_SLIST() 
1226* Allow "logconfig =allall" configuration directive 
1227* Bind tentative IPv6 addresses on Linux 
1228* Correct WWVB/Spectracom driver to timestamp CR instead of LF 
1229* Improved tally bit handling to prevent incorrect ntpq peer status reports 
1230* Exclude the Undisciplined Local Clock and ACTS drivers from the initial 
1231  candidate list unless they are designated a "prefer peer" 
1232* Prevent the consideration of Undisciplined Local Clock or ACTS drivers for 
1233  selection during the 'tos orphanwait' period 
1234* Prefer an Orphan Mode Parent over the Undisciplined Local Clock or ACTS 
1235  drivers 
1236* Improved support of the Parse Refclock trusttime flag in Meinberg mode 
1237* Back-port utility routines from ntp-dev: mprintf(), emalloc_zero() 
1238* Added the NTPD_TICKADJ_PPM environment variable for specifying baseline 
1239  clock slew on Microsoft Windows 
1240* Code cleanup in libntpq 
1241 
1242ntpdc 
1243 
1244* Fix timerstats reporting 
1245 
1246ntpdate 
1247 
1248* Reduce time required to set clock 
1249* Allow a timeout greater than 2 seconds 
1250 
1251sntp 
1252 
1253* Backward incompatible command-line option change: 
1254  -l/--filelog changed -l/--logfile (to be consistent with ntpd) 
1255 
1256Documentation 
1257 
1258* Update html2man. Fix some tags in the .html files 
1259* Distribute ntp-wait.html 
1260
1261---
1262NTP 4.2.6p3 (Harlan Stenn <stenn@ntp.org>, 2011/01/03)
1263
1264Focus: Bug fixes and portability improvements
1265
1266Severity: Medium
1267
1268This is a recommended upgrade.
1269
1270This release includes build infrastructure updates, code
1271clean-ups, minor bug fixes, fixes for a number of minor
1272ref-clock issues, and documentation revisions.
1273
1274Portability improvements in this release affect AIX, Atari FreeMiNT,
1275FreeBSD4, Linux and Microsoft Windows.
1276
1277New features / changes in this release:
1278
1279Build system
1280* Use lsb_release to get information about Linux distributions.
1281* 'test' is in /usr/bin (instead of /bin) on some systems.
1282* Basic sanity checks for the ChangeLog file.
1283* Source certain build files with ./filename for systems without . in PATH.
1284* IRIX portability fix.
1285* Use a single copy of the "libopts" code.
1286* autogen/libopts upgrade.
1287* configure.ac m4 quoting cleanup.
1288
1289ntpd
1290* Do not bind to IN6_IFF_ANYCAST addresses.
1291* Log the reason for exiting under Windows.
1292* Multicast fixes for Windows.
1293* Interpolation fixes for Windows.
1294* IPv4 and IPv6 Multicast fixes.
1295* Manycast solicitation fixes and general repairs.
1296* JJY refclock cleanup.
1297* NMEA refclock improvements.
1298* Oncore debug message cleanup.
1299* Palisade refclock now builds under Linux.
1300* Give RAWDCF more baud rates.
1301* Support Truetime Satellite clocks under Windows.
1302* Support Arbiter 1093C Satellite clocks under Windows.
1303* Make sure that the "filegen" configuration command defaults to "enable".
1304* Range-check the status codes (plus other cleanup) in the RIPE-NCC driver.
1305* Prohibit 'includefile' directive in remote configuration command.
1306* Fix 'nic' interface bindings.
1307* Fix the way we link with openssl if openssl is installed in the base
1308  system.
1309
1310ntp-keygen
1311* Fix -V coredump.
1312* OpenSSL version display cleanup.
1313
1314ntpdc
1315* Many counters should be treated as unsigned.
1316
1317ntpdate
1318* Do not ignore replies with equal receive and transmit timestamps.
1319
1320ntpq
1321* libntpq warning cleanup.
1322
1323ntpsnmpd
1324* Correct SNMP type for "precision" and "resolution".
1325* Update the MIB from the draft version to RFC-5907.
1326
1327sntp
1328* Display timezone offset when showing time for sntp in the local
1329  timezone.
1330* Pay proper attention to RATE KoD packets.
1331* Fix a miscalculation of the offset.
1332* Properly parse empty lines in the key file.
1333* Logging cleanup.
1334* Use tv_usec correctly in set_time().
1335* Documentation cleanup.
1336
1337---
1338NTP 4.2.6p2 (Harlan Stenn <stenn@ntp.org>, 2010/07/08)
1339
1340Focus: Bug fixes and portability improvements
1341
1342Severity: Medium
1343
1344This is a recommended upgrade.
1345
1346This release includes build infrastructure updates, code
1347clean-ups, minor bug fixes, fixes for a number of minor
1348ref-clock issues, improved KOD handling, OpenSSL related
1349updates and documentation revisions.
1350
1351Portability improvements in this release affect Irix, Linux,
1352Mac OS, Microsoft Windows, OpenBSD and QNX6
1353
1354New features / changes in this release:
1355
1356ntpd
1357* Range syntax for the trustedkey configuration directive
1358* Unified IPv4 and IPv6 restrict lists
1359
1360ntpdate
1361* Rate limiting and KOD handling
1362
1363ntpsnmpd
1364* default connection to net-snmpd via a unix-domain socket
1365* command-line 'socket name' option
1366
1367ntpq / ntpdc
1368* support for the "passwd ..." syntax
1369* key-type specific password prompts
1370
1371sntp
1372* MD5 authentication of an ntpd
1373* Broadcast and crypto
1374* OpenSSL support
1375
1376---
1377NTP 4.2.6p1 (Harlan Stenn <stenn@ntp.org>, 2010/04/09)
1378
1379Focus: Bug fixes, portability fixes, and documentation improvements
1380
1381Severity: Medium
1382
1383This is a recommended upgrade.
1384
1385---
1386NTP 4.2.6 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
1387
1388Focus: enhancements and bug fixes.
1389
1390---
1391NTP 4.2.4p8 (Harlan Stenn <stenn@ntp.org>, 2009/12/08)
1392
1393Focus: Security Fixes
1394
1395Severity: HIGH
1396
1397This release fixes the following high-severity vulnerability:
1398
1399* [Sec 1331] DoS with mode 7 packets - CVE-2009-3563.
1400
1401  See http://support.ntp.org/security for more information.
1402
1403  NTP mode 7 (MODE_PRIVATE) is used by the ntpdc query and control utility.
1404  In contrast, ntpq uses NTP mode 6 (MODE_CONTROL), while routine NTP time
1405  transfers use modes 1 through 5.  Upon receipt of an incorrect mode 7
1406  request or a mode 7 error response from an address which is not listed
1407  in a "restrict ... noquery" or "restrict ... ignore" statement, ntpd will
1408  reply with a mode 7 error response (and log a message).  In this case:
1409
1410	* If an attacker spoofs the source address of ntpd host A in a
1411	  mode 7 response packet sent to ntpd host B, both A and B will
1412	  continuously send each other error responses, for as long as
1413	  those packets get through.
1414
1415	* If an attacker spoofs an address of ntpd host A in a mode 7
1416	  response packet sent to ntpd host A, A will respond to itself
1417	  endlessly, consuming CPU and logging excessively.
1418
1419  Credit for finding this vulnerability goes to Robin Park and Dmitri
1420  Vinokurov of Alcatel-Lucent.
1421
1422THIS IS A STRONGLY RECOMMENDED UPGRADE.
1423
1424---
1425ntpd now syncs to refclocks right away.
1426
1427Backward-Incompatible changes:
1428
1429ntpd no longer accepts '-v name' or '-V name' to define internal variables.
1430Use '--var name' or '--dvar name' instead. (Bug 817)
1431
1432---
1433NTP 4.2.4p7 (Harlan Stenn <stenn@ntp.org>, 2009/05/04)
1434
1435Focus: Security and Bug Fixes
1436
1437Severity: HIGH
1438
1439This release fixes the following high-severity vulnerability:
1440
1441* [Sec 1151] Remote exploit if autokey is enabled.  CVE-2009-1252
1442
1443  See http://support.ntp.org/security for more information.
1444
1445  If autokey is enabled (if ntp.conf contains a "crypto pw whatever"
1446  line) then a carefully crafted packet sent to the machine will cause
1447  a buffer overflow and possible execution of injected code, running
1448  with the privileges of the ntpd process (often root).
1449
1450  Credit for finding this vulnerability goes to Chris Ries of CMU.
1451
1452This release fixes the following low-severity vulnerabilities:
1453
1454* [Sec 1144] limited (two byte) buffer overflow in ntpq.  CVE-2009-0159
1455  Credit for finding this vulnerability goes to Geoff Keating of Apple.
1456  
1457* [Sec 1149] use SO_EXCLUSIVEADDRUSE on Windows
1458  Credit for finding this issue goes to Dave Hart.
1459
1460This release fixes a number of bugs and adds some improvements:
1461
1462* Improved logging
1463* Fix many compiler warnings
1464* Many fixes and improvements for Windows
1465* Adds support for AIX 6.1
1466* Resolves some issues under MacOS X and Solaris
1467
1468THIS IS A STRONGLY RECOMMENDED UPGRADE.
1469
1470---
1471NTP 4.2.4p6 (Harlan Stenn <stenn@ntp.org>, 2009/01/07)
1472
1473Focus: Security Fix
1474
1475Severity: Low
1476
1477This release fixes oCERT.org's CVE-2009-0021, a vulnerability affecting
1478the OpenSSL library relating to the incorrect checking of the return
1479value of EVP_VerifyFinal function.
1480
1481Credit for finding this issue goes to the Google Security Team for
1482finding the original issue with OpenSSL, and to ocert.org for finding
1483the problem in NTP and telling us about it.
1484
1485This is a recommended upgrade.
1486---
1487NTP 4.2.4p5 (Harlan Stenn <stenn@ntp.org>, 2008/08/17)
1488
1489Focus: Minor Bugfixes 
1490
1491This release fixes a number of Windows-specific ntpd bugs and 
1492platform-independent ntpdate bugs. A logging bugfix has been applied
1493to the ONCORE driver.
1494
1495The "dynamic" keyword and is now obsolete and deferred binding to local 
1496interfaces is the new default. The minimum time restriction for the 
1497interface update interval has been dropped. 
1498
1499A number of minor build system and documentation fixes are included. 
1500
1501This is a recommended upgrade for Windows. 
1502
1503---
1504NTP 4.2.4p4 (Harlan Stenn <stenn@ntp.org>, 2007/09/10)
1505
1506Focus: Minor Bugfixes
1507
1508This release updates certain copyright information, fixes several display
1509bugs in ntpdc, avoids SIGIO interrupting malloc(), cleans up file descriptor
1510shutdown in the parse refclock driver, removes some lint from the code,
1511stops accessing certain buffers immediately after they were freed, fixes
1512a problem with non-command-line specification of -6, and allows the loopback
1513interface to share addresses with other interfaces.
1514
1515---
1516NTP 4.2.4p3 (Harlan Stenn <stenn@ntp.org>, 2007/06/29)
1517
1518Focus: Minor Bugfixes
1519
1520This release fixes a bug in Windows that made it difficult to
1521terminate ntpd under windows.
1522This is a recommended upgrade for Windows.
1523
1524---
1525NTP 4.2.4p2 (Harlan Stenn <stenn@ntp.org>, 2007/06/19)
1526
1527Focus: Minor Bugfixes
1528
1529This release fixes a multicast mode authentication problem, 
1530an error in NTP packet handling on Windows that could lead to 
1531ntpd crashing, and several other minor bugs. Handling of 
1532multicast interfaces and logging configuration were improved. 
1533The required versions of autogen and libopts were incremented.
1534This is a recommended upgrade for Windows and multicast users.
1535
1536---
1537NTP 4.2.4 (Harlan Stenn <stenn@ntp.org>, 2006/12/31)
1538
1539Focus: enhancements and bug fixes.
1540
1541Dynamic interface rescanning was added to simplify the use of ntpd in 
1542conjunction with DHCP. GNU AutoGen is used for its command-line options 
1543processing. Separate PPS devices are supported for PARSE refclocks, MD5 
1544signatures are now provided for the release files. Drivers have been 
1545added for some new ref-clocks and have been removed for some older 
1546ref-clocks. This release also includes other improvements, documentation 
1547and bug fixes. 
1548
1549K&R C is no longer supported as of NTP-4.2.4. We are now aiming for ANSI 
1550C support.
1551
1552---
1553NTP 4.2.0 (Harlan Stenn <stenn@ntp.org>, 2003/10/15)
1554
1555Focus: enhancements and bug fixes.
1556