2016-05-13 17:50:13 +02:00
|
|
|
@comment $NetBSD: PLIST,v 1.22 2016/05/13 15:50:13 bsiegert Exp $
|
2008-06-08 06:53:27 +02:00
|
|
|
bin/sntp
|
|
|
|
man/man1/sntp.1
|
2014-01-12 18:01:02 +01:00
|
|
|
man/man5/ntp.conf.5
|
|
|
|
man/man5/ntp.keys.5
|
Update ntpd4 pacakge to 4.2.8, here is summary for security related fixes.
NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
Focus: Security and Bug fixes, enhancements.
Severity: HIGH
In addition to bug fixes and enhancements, this release fixes the
following high-severity vulnerabilities:
* Weak default key in config_auth().
References: [Sec 2665] / CVE-2014-9293 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: all releases prior to 4.2.7p11
Date Resolved: 28 Jan 2010
Summary: If no 'auth' key is set in the configuration file, ntpd
would generate a random key on the fly. There were two
problems with this: 1) the generated key was 31 bits in size,
and 2) it used the (now weak) ntp_random() function, which was
seeded with a 32-bit value and could only provide 32 bits of
entropy. This was sufficient back in the late 1990s when the
code was written. Not today.
Mitigation: Upgrade to 4.2.7p11 or later.
Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
of the Google Security Team.
* Non-cryptographic random number generator with weak seed used by
ntp-keygen to generate symmetric keys.
References: [Sec 2666] / CVE-2014-9294 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: All NTP4 releases before 4.2.7p230
Date Resolved: Dev (4.2.7p230) 01 Nov 2011
Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
prepare a random number generator that was of good quality back
in the late 1990s. The random numbers produced was then used to
generate symmetric keys. In ntp-4.2.8 we use a current-technology
cryptographic random number generator, either RAND_bytes from
OpenSSL, or arc4random().
Mitigation: Upgrade to 4.2.7p230 or later.
Credit: This vulnerability was discovered in ntp-4.2.6 by
Stephen Roettger of the Google Security Team.
* Buffer overflow in crypto_recv()
References: Sec 2667 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
file contains a 'crypto pw ...' directive) a remote attacker
can send a carefully crafted packet that can overflow a stack
buffer and potentially allow malicious code to be executed
with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later, or
Disable Autokey Authentication by removing, or commenting out,
all configuration directives beginning with the crypto keyword
in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in ctl_putdata()
References: Sec 2668 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in configure()
References: Sec 2669 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* receive(): missing return on error
References: Sec 2670 / CVE-2014-9296 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
the code path where an error was detected, which meant
processing did not stop when a specific rare error occurred.
We haven't found a way for this bug to affect system integrity.
If there is no way to affect system integrity the base CVSS
score for this bug is 0. If there is one avenue through which
system integrity can be partially affected, the base score
becomes a 5. If system integrity can be partially affected
via all three integrity metrics, the CVSS base score become 7.5.
Mitigation:
Upgrade to 4.2.8, or later,
or Remove or comment out all configuration directives
beginning with the crypto keyword in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
See http://support.ntp.org/security for more information.
2014-12-20 10:45:46 +01:00
|
|
|
${PLIST.tickadj}man/man8/calc_tickadj.8
|
2014-01-12 18:01:02 +01:00
|
|
|
man/man8/ntp-keygen.8
|
Update ntpd4 pacakge to 4.2.8, here is summary for security related fixes.
NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
Focus: Security and Bug fixes, enhancements.
Severity: HIGH
In addition to bug fixes and enhancements, this release fixes the
following high-severity vulnerabilities:
* Weak default key in config_auth().
References: [Sec 2665] / CVE-2014-9293 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: all releases prior to 4.2.7p11
Date Resolved: 28 Jan 2010
Summary: If no 'auth' key is set in the configuration file, ntpd
would generate a random key on the fly. There were two
problems with this: 1) the generated key was 31 bits in size,
and 2) it used the (now weak) ntp_random() function, which was
seeded with a 32-bit value and could only provide 32 bits of
entropy. This was sufficient back in the late 1990s when the
code was written. Not today.
Mitigation: Upgrade to 4.2.7p11 or later.
Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
of the Google Security Team.
* Non-cryptographic random number generator with weak seed used by
ntp-keygen to generate symmetric keys.
References: [Sec 2666] / CVE-2014-9294 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: All NTP4 releases before 4.2.7p230
Date Resolved: Dev (4.2.7p230) 01 Nov 2011
Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
prepare a random number generator that was of good quality back
in the late 1990s. The random numbers produced was then used to
generate symmetric keys. In ntp-4.2.8 we use a current-technology
cryptographic random number generator, either RAND_bytes from
OpenSSL, or arc4random().
Mitigation: Upgrade to 4.2.7p230 or later.
Credit: This vulnerability was discovered in ntp-4.2.6 by
Stephen Roettger of the Google Security Team.
* Buffer overflow in crypto_recv()
References: Sec 2667 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
file contains a 'crypto pw ...' directive) a remote attacker
can send a carefully crafted packet that can overflow a stack
buffer and potentially allow malicious code to be executed
with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later, or
Disable Autokey Authentication by removing, or commenting out,
all configuration directives beginning with the crypto keyword
in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in ctl_putdata()
References: Sec 2668 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in configure()
References: Sec 2669 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* receive(): missing return on error
References: Sec 2670 / CVE-2014-9296 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
the code path where an error was detected, which meant
processing did not stop when a specific rare error occurred.
We haven't found a way for this bug to affect system integrity.
If there is no way to affect system integrity the base CVSS
score for this bug is 0. If there is one avenue through which
system integrity can be partially affected, the base score
becomes a 5. If system integrity can be partially affected
via all three integrity metrics, the CVSS base score become 7.5.
Mitigation:
Upgrade to 4.2.8, or later,
or Remove or comment out all configuration directives
beginning with the crypto keyword in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
See http://support.ntp.org/security for more information.
2014-12-20 10:45:46 +01:00
|
|
|
man/man8/ntp-wait.8
|
2014-01-12 18:01:02 +01:00
|
|
|
man/man8/ntpd.8
|
|
|
|
man/man8/ntpdc.8
|
|
|
|
man/man8/ntpq.8
|
2016-05-13 17:50:13 +02:00
|
|
|
${PLIST.ntpsnmpd}man/man8/ntpsnmpd.8
|
Update ntpd4 pacakge to 4.2.8, here is summary for security related fixes.
NTP 4.2.8 (Harlan Stenn <stenn@ntp.org>, 2014/12/18)
Focus: Security and Bug fixes, enhancements.
Severity: HIGH
In addition to bug fixes and enhancements, this release fixes the
following high-severity vulnerabilities:
* Weak default key in config_auth().
References: [Sec 2665] / CVE-2014-9293 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: all releases prior to 4.2.7p11
Date Resolved: 28 Jan 2010
Summary: If no 'auth' key is set in the configuration file, ntpd
would generate a random key on the fly. There were two
problems with this: 1) the generated key was 31 bits in size,
and 2) it used the (now weak) ntp_random() function, which was
seeded with a 32-bit value and could only provide 32 bits of
entropy. This was sufficient back in the late 1990s when the
code was written. Not today.
Mitigation: Upgrade to 4.2.7p11 or later.
Credit: This vulnerability was noticed in ntp-4.2.6 by Neel Mehta
of the Google Security Team.
* Non-cryptographic random number generator with weak seed used by
ntp-keygen to generate symmetric keys.
References: [Sec 2666] / CVE-2014-9294 / VU#852879
CVSS: (AV:N/AC:L/Au:M/C:P/I:P/A:C) Base Score: 7.3
Vulnerable Versions: All NTP4 releases before 4.2.7p230
Date Resolved: Dev (4.2.7p230) 01 Nov 2011
Summary: Prior to ntp-4.2.7p230 ntp-keygen used a weak seed to
prepare a random number generator that was of good quality back
in the late 1990s. The random numbers produced was then used to
generate symmetric keys. In ntp-4.2.8 we use a current-technology
cryptographic random number generator, either RAND_bytes from
OpenSSL, or arc4random().
Mitigation: Upgrade to 4.2.7p230 or later.
Credit: This vulnerability was discovered in ntp-4.2.6 by
Stephen Roettger of the Google Security Team.
* Buffer overflow in crypto_recv()
References: Sec 2667 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: When Autokey Authentication is enabled (i.e. the ntp.conf
file contains a 'crypto pw ...' directive) a remote attacker
can send a carefully crafted packet that can overflow a stack
buffer and potentially allow malicious code to be executed
with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later, or
Disable Autokey Authentication by removing, or commenting out,
all configuration directives beginning with the crypto keyword
in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in ctl_putdata()
References: Sec 2668 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* Buffer overflow in configure()
References: Sec 2669 / CVE-2014-9295 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:P/I:P/A:P) Base Score: 7.5
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: A remote attacker can send a carefully crafted packet that
can overflow a stack buffer and potentially allow malicious
code to be executed with the privilege level of the ntpd process.
Mitigation: Upgrade to 4.2.8, or later.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
* receive(): missing return on error
References: Sec 2670 / CVE-2014-9296 / VU#852879
CVSS: (AV:N/AC:L/Au:N/C:N/I:N/A:P) Base Score: 5.0
Versions: All NTP4 releases before 4.2.8
Date Resolved: Stable (4.2.8) 18 Dec 2014
Summary: Code in ntp_proto.c:receive() was missing a 'return;' in
the code path where an error was detected, which meant
processing did not stop when a specific rare error occurred.
We haven't found a way for this bug to affect system integrity.
If there is no way to affect system integrity the base CVSS
score for this bug is 0. If there is one avenue through which
system integrity can be partially affected, the base score
becomes a 5. If system integrity can be partially affected
via all three integrity metrics, the CVSS base score become 7.5.
Mitigation:
Upgrade to 4.2.8, or later,
or Remove or comment out all configuration directives
beginning with the crypto keyword in your ntp.conf file.
Credit: This vulnerability was discovered by Stephen Roettger of the
Google Security Team.
See http://support.ntp.org/security for more information.
2014-12-20 10:45:46 +01:00
|
|
|
man/man8/ntptrace.8
|
2014-01-12 18:01:02 +01:00
|
|
|
${PLIST.tickadj}sbin/calc_tickadj
|
|
|
|
sbin/ntp-keygen
|
|
|
|
sbin/ntp-wait
|
|
|
|
sbin/ntpd
|
|
|
|
sbin/ntpdate
|
|
|
|
sbin/ntpdc
|
|
|
|
sbin/ntpq
|
2016-05-13 17:50:13 +02:00
|
|
|
${PLIST.ntpsnmpd}sbin/ntpsnmpd
|
2014-01-12 18:01:02 +01:00
|
|
|
${PLIST.ntptime}sbin/ntptime
|
|
|
|
sbin/ntptrace
|
|
|
|
${PLIST.tickadj}sbin/tickadj
|
|
|
|
${PLIST.timetrim}sbin/timetrim
|
Update ntp4 to 4.2.8p4.
pkgsrc change:
* Remove duplicated HTML documents.
* Install some addtional documents.
Changes are too many to write here, please refer NEWS files and this
release fixes security problems.
October 2015 NTP Security Vulnerability Announcement (Medium)
NTF's NTP Project has been notified of the following 13 low- and
medium-severity vulnerabilities that are fixed in ntp-4.2.8p4, released on
Wednesday, 21 October 2015:
* Bug 2941 CVE-2015-7871 NAK to the Future: Symmetric association
authentication bypass via crypto-NAK (Cisco ASIG)
* Bug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning
FAIL on some bogus values (IDA)
* Bug 2921 CVE-2015-7854 Password Length Memory Corruption
Vulnerability. (Cisco TALOS)
* Bug 2920 CVE-2015-7853 Invalid length data provided by a custom refclock
driver could cause a buffer overflow. (Cisco TALOS)
* Bug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption
Vulnerability. (Cisco TALOS)
* Bug 2918 CVE-2015-7851 saveconfig Directory Traversal
Vulnerability. (OpenVMS) (Cisco TALOS)
* Bug 2917 CVE-2015-7850 remote config logfile-keyfile. (Cisco TALOS)
* Bug 2916 CVE-2015-7849 trusted key use-after-free. (Cisco TALOS)
* Bug 2913 CVE-2015-7848 mode 7 loop counter underrun. (Cisco TALOS)
* Bug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC. (Tenable)
* Bug 2902 : CVE-2015-7703 configuration directives "pidfile" and "driftfile"
should only be allowed locally. (RedHat)
* Bug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
validate the origin timestamp field. (Boston University)
* Bug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
data packet length checks. (Tenable)
The only generally-exploitable bug in the above list is the crypto-NAK bug,
which has a CVSS2 score of 6.4.
Additionally, three bugs that have already been fixed in ntp-4.2.8 but were
not fixed in ntp-4.2.6 as it was EOL'd have a security component, but are all
below 1.8 CVSS score, so we're reporting them here:
* Bug 2382 : Peer precision < -31 gives division by zero
* Bug 1774 : Segfaults if cryptostats enabled when built without OpenSSL
* Bug 1593 : ntpd abort in free() with logconfig syntax error
2015-10-23 05:43:31 +02:00
|
|
|
share/doc/ntp/COPYRIGHT
|
|
|
|
share/doc/ntp/ChangeLog
|
|
|
|
share/doc/ntp/NEWS
|
|
|
|
share/doc/ntp/README
|
|
|
|
share/doc/ntp/README.bk
|
|
|
|
share/doc/ntp/README.hackers
|
|
|
|
share/doc/ntp/README.leapsmear
|
|
|
|
share/doc/ntp/README.patches
|
2016-04-27 17:59:19 +02:00
|
|
|
share/doc/ntp/README.pullrequests
|
Update ntp4 to 4.2.8p4.
pkgsrc change:
* Remove duplicated HTML documents.
* Install some addtional documents.
Changes are too many to write here, please refer NEWS files and this
release fixes security problems.
October 2015 NTP Security Vulnerability Announcement (Medium)
NTF's NTP Project has been notified of the following 13 low- and
medium-severity vulnerabilities that are fixed in ntp-4.2.8p4, released on
Wednesday, 21 October 2015:
* Bug 2941 CVE-2015-7871 NAK to the Future: Symmetric association
authentication bypass via crypto-NAK (Cisco ASIG)
* Bug 2922 CVE-2015-7855 decodenetnum() will ASSERT botch instead of returning
FAIL on some bogus values (IDA)
* Bug 2921 CVE-2015-7854 Password Length Memory Corruption
Vulnerability. (Cisco TALOS)
* Bug 2920 CVE-2015-7853 Invalid length data provided by a custom refclock
driver could cause a buffer overflow. (Cisco TALOS)
* Bug 2919 CVE-2015-7852 ntpq atoascii() Memory Corruption
Vulnerability. (Cisco TALOS)
* Bug 2918 CVE-2015-7851 saveconfig Directory Traversal
Vulnerability. (OpenVMS) (Cisco TALOS)
* Bug 2917 CVE-2015-7850 remote config logfile-keyfile. (Cisco TALOS)
* Bug 2916 CVE-2015-7849 trusted key use-after-free. (Cisco TALOS)
* Bug 2913 CVE-2015-7848 mode 7 loop counter underrun. (Cisco TALOS)
* Bug 2909 CVE-2015-7701 Slow memory leak in CRYPTO_ASSOC. (Tenable)
* Bug 2902 : CVE-2015-7703 configuration directives "pidfile" and "driftfile"
should only be allowed locally. (RedHat)
* Bug 2901 : CVE-2015-7704, CVE-2015-7705 Clients that receive a KoD should
validate the origin timestamp field. (Boston University)
* Bug 2899 : CVE-2015-7691, CVE-2015-7692, CVE-2015-7702 Incomplete autokey
data packet length checks. (Tenable)
The only generally-exploitable bug in the above list is the crypto-NAK bug,
which has a CVSS2 score of 6.4.
Additionally, three bugs that have already been fixed in ntp-4.2.8 but were
not fixed in ntp-4.2.6 as it was EOL'd have a security component, but are all
below 1.8 CVSS score, so we're reporting them here:
* Bug 2382 : Peer precision < -31 gives division by zero
* Bug 1774 : Segfaults if cryptostats enabled when built without OpenSSL
* Bug 1593 : ntpd abort in free() with logconfig syntax error
2015-10-23 05:43:31 +02:00
|
|
|
share/doc/ntp/README.refclocks
|
|
|
|
share/doc/ntp/README.versions
|
|
|
|
share/doc/ntp/TODO
|
2015-03-21 21:49:28 +01:00
|
|
|
share/doc/ntp/html/access.html
|
|
|
|
share/doc/ntp/html/accopt.html
|
|
|
|
share/doc/ntp/html/assoc.html
|
|
|
|
share/doc/ntp/html/audio.html
|
|
|
|
share/doc/ntp/html/authentic.html
|
|
|
|
share/doc/ntp/html/authopt.html
|
|
|
|
share/doc/ntp/html/autokey.html
|
|
|
|
share/doc/ntp/html/bugs.html
|
|
|
|
share/doc/ntp/html/build.html
|
|
|
|
share/doc/ntp/html/clock.html
|
|
|
|
share/doc/ntp/html/clockopt.html
|
|
|
|
share/doc/ntp/html/cluster.html
|
|
|
|
share/doc/ntp/html/comdex.html
|
|
|
|
share/doc/ntp/html/config.html
|
|
|
|
share/doc/ntp/html/confopt.html
|
|
|
|
share/doc/ntp/html/copyright.html
|
|
|
|
share/doc/ntp/html/debug.html
|
|
|
|
share/doc/ntp/html/decode.html
|
|
|
|
share/doc/ntp/html/discipline.html
|
|
|
|
share/doc/ntp/html/discover.html
|
|
|
|
share/doc/ntp/html/drivers/driver1.html
|
|
|
|
share/doc/ntp/html/drivers/driver10.html
|
|
|
|
share/doc/ntp/html/drivers/driver11.html
|
|
|
|
share/doc/ntp/html/drivers/driver12.html
|
|
|
|
share/doc/ntp/html/drivers/driver16.html
|
|
|
|
share/doc/ntp/html/drivers/driver18.html
|
|
|
|
share/doc/ntp/html/drivers/driver19.html
|
|
|
|
share/doc/ntp/html/drivers/driver20.html
|
|
|
|
share/doc/ntp/html/drivers/driver22.html
|
|
|
|
share/doc/ntp/html/drivers/driver26.html
|
|
|
|
share/doc/ntp/html/drivers/driver27.html
|
|
|
|
share/doc/ntp/html/drivers/driver28.html
|
|
|
|
share/doc/ntp/html/drivers/driver29.html
|
|
|
|
share/doc/ntp/html/drivers/driver3.html
|
|
|
|
share/doc/ntp/html/drivers/driver30.html
|
|
|
|
share/doc/ntp/html/drivers/driver31.html
|
|
|
|
share/doc/ntp/html/drivers/driver32.html
|
|
|
|
share/doc/ntp/html/drivers/driver33.html
|
|
|
|
share/doc/ntp/html/drivers/driver34.html
|
|
|
|
share/doc/ntp/html/drivers/driver35.html
|
|
|
|
share/doc/ntp/html/drivers/driver36.html
|
|
|
|
share/doc/ntp/html/drivers/driver37.html
|
|
|
|
share/doc/ntp/html/drivers/driver38.html
|
|
|
|
share/doc/ntp/html/drivers/driver39.html
|
|
|
|
share/doc/ntp/html/drivers/driver4.html
|
Update ntp4 to 4.2.8p3.
Please refer NEWS and ChangeLog for full changes.
NTP 4.2.8p3 (Harlan Stenn <stenn@ntp.org>, 2015/06/29)
Focus: 1 Security fix. Bug fixes and enhancements. Leap-second improvements.
Severity: MEDIUM
Security Fix:
* [Sec 2853] Crafted remote config packet can crash some versions of
ntpd. Aleksis Kauppinen, Juergen Perlinger, Harlan Stenn.
Under specific circumstances an attacker can send a crafted packet to
cause a vulnerable ntpd instance to crash. This requires each of the
following to be true:
1) ntpd set up to allow remote configuration (not allowed by default), and
2) knowledge of the configuration password, and
3) access to a computer entrusted to perform remote configuration.
This vulnerability is considered low-risk.
New features in this release:
Optional (disabled by default) support to have ntpd provide smeared
leap second time. A specially built and configured ntpd will only
offer smeared time in response to client packets. These response
packets will also contain a "refid" of 254.a.b.c, where the 24 bits
of a, b, and c encode the amount of smear in a 2:22 integer:fraction
format. See README.leapsmear and http://bugs.ntp.org/2855 for more
information.
*IF YOU CHOOSE TO CONFIGURE NTPD TO PROVIDE LEAP SMEAR TIME*
*BE SURE YOU DO NOT OFFER THAT TIME ON PUBLIC TIMESERVERS.*
We've imported the Unity test framework, and have begun converting
the existing google-test items to this new framework. If you want
to write new tests or change old ones, you'll need to have ruby
installed. You don't need ruby to run the test suite.
2015-06-30 18:08:21 +02:00
|
|
|
share/doc/ntp/html/drivers/driver40-ja.html
|
2015-03-21 21:49:28 +01:00
|
|
|
share/doc/ntp/html/drivers/driver40.html
|
|
|
|
share/doc/ntp/html/drivers/driver42.html
|
|
|
|
share/doc/ntp/html/drivers/driver43.html
|
|
|
|
share/doc/ntp/html/drivers/driver44.html
|
|
|
|
share/doc/ntp/html/drivers/driver45.html
|
|
|
|
share/doc/ntp/html/drivers/driver46.html
|
|
|
|
share/doc/ntp/html/drivers/driver5.html
|
|
|
|
share/doc/ntp/html/drivers/driver6.html
|
|
|
|
share/doc/ntp/html/drivers/driver7.html
|
|
|
|
share/doc/ntp/html/drivers/driver8.html
|
|
|
|
share/doc/ntp/html/drivers/driver9.html
|
|
|
|
share/doc/ntp/html/drivers/icons/home.gif
|
|
|
|
share/doc/ntp/html/drivers/icons/mail2.gif
|
|
|
|
share/doc/ntp/html/drivers/mx4200data.html
|
|
|
|
share/doc/ntp/html/drivers/oncore-shmem.html
|
|
|
|
share/doc/ntp/html/drivers/scripts/footer.txt
|
|
|
|
share/doc/ntp/html/drivers/scripts/style.css
|
|
|
|
share/doc/ntp/html/drivers/tf582_4.html
|
|
|
|
share/doc/ntp/html/extern.html
|
|
|
|
share/doc/ntp/html/filter.html
|
|
|
|
share/doc/ntp/html/hints.html
|
|
|
|
share/doc/ntp/html/hints/a-ux
|
|
|
|
share/doc/ntp/html/hints/aix
|
|
|
|
share/doc/ntp/html/hints/bsdi
|
|
|
|
share/doc/ntp/html/hints/changes
|
|
|
|
share/doc/ntp/html/hints/decosf1
|
|
|
|
share/doc/ntp/html/hints/decosf2
|
|
|
|
share/doc/ntp/html/hints/freebsd
|
|
|
|
share/doc/ntp/html/hints/hpux
|
|
|
|
share/doc/ntp/html/hints/linux
|
|
|
|
share/doc/ntp/html/hints/mpeix
|
|
|
|
share/doc/ntp/html/hints/notes-xntp-v3
|
|
|
|
share/doc/ntp/html/hints/parse
|
|
|
|
share/doc/ntp/html/hints/refclocks
|
|
|
|
share/doc/ntp/html/hints/rs6000
|
|
|
|
share/doc/ntp/html/hints/sco.html
|
|
|
|
share/doc/ntp/html/hints/sgi
|
|
|
|
share/doc/ntp/html/hints/solaris-dosynctodr.html
|
|
|
|
share/doc/ntp/html/hints/solaris.html
|
|
|
|
share/doc/ntp/html/hints/solaris.xtra.4023118
|
|
|
|
share/doc/ntp/html/hints/solaris.xtra.4095849
|
|
|
|
share/doc/ntp/html/hints/solaris.xtra.S99ntpd
|
|
|
|
share/doc/ntp/html/hints/solaris.xtra.patchfreq
|
|
|
|
share/doc/ntp/html/hints/sun4
|
|
|
|
share/doc/ntp/html/hints/svr4-dell
|
|
|
|
share/doc/ntp/html/hints/svr4_package
|
|
|
|
share/doc/ntp/html/hints/todo
|
|
|
|
share/doc/ntp/html/hints/vxworks.html
|
|
|
|
share/doc/ntp/html/hints/winnt.html
|
|
|
|
share/doc/ntp/html/history.html
|
|
|
|
share/doc/ntp/html/howto.html
|
|
|
|
share/doc/ntp/html/huffpuff.html
|
|
|
|
share/doc/ntp/html/icons/home.gif
|
|
|
|
share/doc/ntp/html/icons/mail2.gif
|
|
|
|
share/doc/ntp/html/icons/sitemap.png
|
|
|
|
share/doc/ntp/html/index.html
|
|
|
|
share/doc/ntp/html/kern.html
|
|
|
|
share/doc/ntp/html/kernpps.html
|
|
|
|
share/doc/ntp/html/keygen.html
|
|
|
|
share/doc/ntp/html/leap.html
|
|
|
|
share/doc/ntp/html/miscopt.html
|
|
|
|
share/doc/ntp/html/monopt.html
|
|
|
|
share/doc/ntp/html/msyslog.html
|
|
|
|
share/doc/ntp/html/ntp-wait.html
|
|
|
|
share/doc/ntp/html/ntp_conf.html
|
|
|
|
share/doc/ntp/html/ntpd.html
|
|
|
|
share/doc/ntp/html/ntpdate.html
|
|
|
|
share/doc/ntp/html/ntpdc.html
|
|
|
|
share/doc/ntp/html/ntpdsim.html
|
|
|
|
share/doc/ntp/html/ntpdsim_new.html
|
|
|
|
share/doc/ntp/html/ntpq.html
|
|
|
|
share/doc/ntp/html/ntptime.html
|
|
|
|
share/doc/ntp/html/ntptrace.html
|
|
|
|
share/doc/ntp/html/orphan.html
|
|
|
|
share/doc/ntp/html/parsedata.html
|
|
|
|
share/doc/ntp/html/parsenew.html
|
|
|
|
share/doc/ntp/html/pic/9400n.jpg
|
|
|
|
share/doc/ntp/html/pic/alice11.gif
|
|
|
|
share/doc/ntp/html/pic/alice13.gif
|
|
|
|
share/doc/ntp/html/pic/alice15.gif
|
|
|
|
share/doc/ntp/html/pic/alice23.gif
|
|
|
|
share/doc/ntp/html/pic/alice31.gif
|
|
|
|
share/doc/ntp/html/pic/alice32.gif
|
|
|
|
share/doc/ntp/html/pic/alice35.gif
|
|
|
|
share/doc/ntp/html/pic/alice38.gif
|
|
|
|
share/doc/ntp/html/pic/alice44.gif
|
|
|
|
share/doc/ntp/html/pic/alice47.gif
|
|
|
|
share/doc/ntp/html/pic/alice51.gif
|
|
|
|
share/doc/ntp/html/pic/alice61.gif
|
|
|
|
share/doc/ntp/html/pic/barnstable.gif
|
|
|
|
share/doc/ntp/html/pic/beaver.gif
|
|
|
|
share/doc/ntp/html/pic/boom3.gif
|
|
|
|
share/doc/ntp/html/pic/boom3a.gif
|
|
|
|
share/doc/ntp/html/pic/boom4.gif
|
|
|
|
share/doc/ntp/html/pic/broad.gif
|
|
|
|
share/doc/ntp/html/pic/bustardfly.gif
|
|
|
|
share/doc/ntp/html/pic/c51.jpg
|
|
|
|
share/doc/ntp/html/pic/description.jpg
|
|
|
|
share/doc/ntp/html/pic/discipline.gif
|
|
|
|
share/doc/ntp/html/pic/dogsnake.gif
|
|
|
|
share/doc/ntp/html/pic/driver29.gif
|
|
|
|
share/doc/ntp/html/pic/driver43_1.gif
|
|
|
|
share/doc/ntp/html/pic/driver43_2.jpg
|
|
|
|
share/doc/ntp/html/pic/fg6021.gif
|
|
|
|
share/doc/ntp/html/pic/fg6039.jpg
|
|
|
|
share/doc/ntp/html/pic/fig_3_1.gif
|
|
|
|
share/doc/ntp/html/pic/flatheads.gif
|
|
|
|
share/doc/ntp/html/pic/flt1.gif
|
|
|
|
share/doc/ntp/html/pic/flt2.gif
|
|
|
|
share/doc/ntp/html/pic/flt3.gif
|
|
|
|
share/doc/ntp/html/pic/flt4.gif
|
|
|
|
share/doc/ntp/html/pic/flt5.gif
|
|
|
|
share/doc/ntp/html/pic/flt6.gif
|
|
|
|
share/doc/ntp/html/pic/flt7.gif
|
|
|
|
share/doc/ntp/html/pic/flt8.gif
|
|
|
|
share/doc/ntp/html/pic/flt9.gif
|
|
|
|
share/doc/ntp/html/pic/freq1211.gif
|
|
|
|
share/doc/ntp/html/pic/gadget.jpg
|
|
|
|
share/doc/ntp/html/pic/gps167.jpg
|
|
|
|
share/doc/ntp/html/pic/group.gif
|
|
|
|
share/doc/ntp/html/pic/hornraba.gif
|
|
|
|
share/doc/ntp/html/pic/igclock.gif
|
|
|
|
share/doc/ntp/html/pic/neoclock4x.gif
|
|
|
|
share/doc/ntp/html/pic/offset1211.gif
|
|
|
|
share/doc/ntp/html/pic/oncore_evalbig.gif
|
|
|
|
share/doc/ntp/html/pic/oncore_remoteant.jpg
|
|
|
|
share/doc/ntp/html/pic/oncore_utplusbig.gif
|
|
|
|
share/doc/ntp/html/pic/oz2.gif
|
|
|
|
share/doc/ntp/html/pic/panda.gif
|
|
|
|
share/doc/ntp/html/pic/pd_om006.gif
|
|
|
|
share/doc/ntp/html/pic/pd_om011.gif
|
|
|
|
share/doc/ntp/html/pic/peer.gif
|
|
|
|
share/doc/ntp/html/pic/pogo.gif
|
|
|
|
share/doc/ntp/html/pic/pogo1a.gif
|
|
|
|
share/doc/ntp/html/pic/pogo3a.gif
|
|
|
|
share/doc/ntp/html/pic/pogo4.gif
|
|
|
|
share/doc/ntp/html/pic/pogo5.gif
|
|
|
|
share/doc/ntp/html/pic/pogo6.gif
|
|
|
|
share/doc/ntp/html/pic/pogo7.gif
|
|
|
|
share/doc/ntp/html/pic/pogo8.gif
|
|
|
|
share/doc/ntp/html/pic/pzf509.jpg
|
|
|
|
share/doc/ntp/html/pic/pzf511.jpg
|
|
|
|
share/doc/ntp/html/pic/rabbit.gif
|
|
|
|
share/doc/ntp/html/pic/radio2.jpg
|
|
|
|
share/doc/ntp/html/pic/sheepb.jpg
|
|
|
|
share/doc/ntp/html/pic/stack1a.jpg
|
|
|
|
share/doc/ntp/html/pic/stats.gif
|
|
|
|
share/doc/ntp/html/pic/sx5.gif
|
|
|
|
share/doc/ntp/html/pic/thunderbolt.jpg
|
|
|
|
share/doc/ntp/html/pic/time1.gif
|
|
|
|
share/doc/ntp/html/pic/tonea.gif
|
|
|
|
share/doc/ntp/html/pic/tribeb.gif
|
|
|
|
share/doc/ntp/html/pic/wingdorothy.gif
|
|
|
|
share/doc/ntp/html/poll.html
|
|
|
|
share/doc/ntp/html/pps.html
|
|
|
|
share/doc/ntp/html/prefer.html
|
|
|
|
share/doc/ntp/html/quick.html
|
|
|
|
share/doc/ntp/html/rate.html
|
|
|
|
share/doc/ntp/html/rdebug.html
|
|
|
|
share/doc/ntp/html/refclock.html
|
|
|
|
share/doc/ntp/html/release.html
|
|
|
|
share/doc/ntp/html/scripts/accopt.txt
|
|
|
|
share/doc/ntp/html/scripts/audio.txt
|
|
|
|
share/doc/ntp/html/scripts/authopt.txt
|
|
|
|
share/doc/ntp/html/scripts/clockopt.txt
|
|
|
|
share/doc/ntp/html/scripts/command.txt
|
|
|
|
share/doc/ntp/html/scripts/config.txt
|
|
|
|
share/doc/ntp/html/scripts/confopt.txt
|
|
|
|
share/doc/ntp/html/scripts/external.txt
|
|
|
|
share/doc/ntp/html/scripts/footer.txt
|
|
|
|
share/doc/ntp/html/scripts/hand.txt
|
|
|
|
share/doc/ntp/html/scripts/install.txt
|
|
|
|
share/doc/ntp/html/scripts/manual.txt
|
|
|
|
share/doc/ntp/html/scripts/misc.txt
|
|
|
|
share/doc/ntp/html/scripts/miscopt.txt
|
|
|
|
share/doc/ntp/html/scripts/monopt.txt
|
|
|
|
share/doc/ntp/html/scripts/refclock.txt
|
|
|
|
share/doc/ntp/html/scripts/special.txt
|
|
|
|
share/doc/ntp/html/scripts/style.css
|
|
|
|
share/doc/ntp/html/select.html
|
|
|
|
share/doc/ntp/html/sitemap.html
|
|
|
|
share/doc/ntp/html/sntp.html
|
|
|
|
share/doc/ntp/html/stats.html
|
|
|
|
share/doc/ntp/html/tickadj.html
|
|
|
|
share/doc/ntp/html/warp.html
|
|
|
|
share/doc/ntp/html/xleave.html
|
|
|
|
share/doc/ntp/ntp-keygen.html
|
|
|
|
share/doc/ntp/ntp-wait.html
|
|
|
|
share/doc/ntp/ntp.conf.html
|
|
|
|
share/doc/ntp/ntp.keys.html
|
|
|
|
share/doc/ntp/ntpd.html
|
|
|
|
share/doc/ntp/ntpdc.html
|
|
|
|
share/doc/ntp/ntpq.html
|
|
|
|
share/doc/ntp/ntpsnmpd.html
|
|
|
|
share/doc/ntp/ntpsweep.html
|
|
|
|
share/doc/ntp/ntptrace.html
|
Update ntp4 package to 4.2.8p2.
NTP 4.2.8p2 (Harlan Stenn <stenn@ntp.org>, 2015/04/xx)
Focus: Security and Bug fixes, enhancements.
Severity: MEDIUM
In addition to bug fixes and enhancements, this release fixes the
following medium-severity vulnerabilities involving private key
authentication:
* [Sec 2779] ntpd accepts unauthenticated packets with symmetric key crypto.
References: Sec 2779 / CVE-2015-1798 / VU#374268
Affects: All NTP4 releases starting with ntp-4.2.5p99 up to but not
including ntp-4.2.8p2 where the installation uses symmetric keys
to authenticate remote associations.
CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
Date Resolved: Stable (4.2.8p2) 07 Apr 2015
Summary: When ntpd is configured to use a symmetric key to authenticate
a remote NTP server/peer, it checks if the NTP message
authentication code (MAC) in received packets is valid, but not if
there actually is any MAC included. Packets without a MAC are
accepted as if they had a valid MAC. This allows a MITM attacker to
send false packets that are accepted by the client/peer without
having to know the symmetric key. The attacker needs to know the
transmit timestamp of the client to match it in the forged reply
and the false reply needs to reach the client before the genuine
reply from the server. The attacker doesn't necessarily need to be
relaying the packets between the client and the server.
Authentication using autokey doesn't have this problem as there is
a check that requires the key ID to be larger than NTP_MAXKEY,
which fails for packets without a MAC.
Mitigation:
Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
or the NTP Public Services Project Download Page
Configure ntpd with enough time sources and monitor it properly.
Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
* [Sec 2781] Authentication doesn't protect symmetric associations against
DoS attacks.
References: Sec 2781 / CVE-2015-1799 / VU#374268
Affects: All NTP releases starting with at least xntp3.3wy up to but
not including ntp-4.2.8p2 where the installation uses symmetric
key authentication.
CVSS: (AV:A/AC:M/Au:N/C:P/I:P/A:P) Base Score: 5.4
Note: the CVSS base Score for this issue could be 4.3 or lower, and
it could be higher than 5.4.
Date Resolved: Stable (4.2.8p2) 07 Apr 2015
Summary: An attacker knowing that NTP hosts A and B are peering with
each other (symmetric association) can send a packet to host A
with source address of B which will set the NTP state variables
on A to the values sent by the attacker. Host A will then send
on its next poll to B a packet with originate timestamp that
doesn't match the transmit timestamp of B and the packet will
be dropped. If the attacker does this periodically for both
hosts, they won't be able to synchronize to each other. This is
a known denial-of-service attack, described at
https://www.eecis.udel.edu/~mills/onwire.html .
According to the document the NTP authentication is supposed to
protect symmetric associations against this attack, but that
doesn't seem to be the case. The state variables are updated even
when authentication fails and the peers are sending packets with
originate timestamps that don't match the transmit timestamps on
the receiving side.
This seems to be a very old problem, dating back to at least
xntp3.3wy. It's also in the NTPv3 (RFC 1305) and NTPv4 (RFC 5905)
specifications, so other NTP implementations with support for
symmetric associations and authentication may be vulnerable too.
An update to the NTP RFC to correct this error is in-process.
Mitigation:
Upgrade to 4.2.8p2, or later, from the NTP Project Download Page
or the NTP Public Services Project Download Page
Note that for users of autokey, this specific style of MITM attack
is simply a long-known potential problem.
Configure ntpd with appropriate time sources and monitor ntpd.
Alert your staff if problems are detected.
Credit: This issue was discovered by Miroslav Lichvar, of Red Hat.
* New script: update-leap
The update-leap script will verify and if necessary, update the
leap-second definition file.
It requires the following commands in order to work:
wget logger tr sed shasum
Some may choose to run this from cron. It needs more portability testing.
2015-04-08 05:31:33 +02:00
|
|
|
share/doc/ntp/update-leap.html
|
2014-01-12 18:01:02 +01:00
|
|
|
share/doc/sntp/sntp.html
|
1999-08-13 10:54:28 +02:00
|
|
|
share/examples/ntp4/README
|
|
|
|
share/examples/ntp4/baldwin.conf
|
2003-10-24 06:52:26 +02:00
|
|
|
share/examples/ntp4/beauregard.conf
|
1999-08-13 10:54:28 +02:00
|
|
|
share/examples/ntp4/grundoon.conf
|
|
|
|
share/examples/ntp4/malarky.conf
|
|
|
|
share/examples/ntp4/pogo.conf
|
2001-07-12 18:24:58 +02:00
|
|
|
share/examples/ntp4/rackety.conf
|
2014-01-12 18:01:02 +01:00
|
|
|
share/ntp/lib/NTP/Util.pm
|