Commit Graph

38 Commits

Author SHA1 Message Date
matthieu
b643238f28 Normalize adjtime parameter(). ok cheloha@, kn@, naddy@.
First commit attempt didn't pick up this file that existed in Attic.
2020-09-27 14:51:56 +00:00
matthieu
ba415e6526 Normalize adjtime() parameter. ok cheloha@, kn@, naddy@. 2020-09-27 14:48:17 +00:00
tb
b1f2ce92a0 Remove Windows specific LIBRESSL_VERSION_NUMBER patches.
ok jca sthen
2018-08-27 03:56:17 +00:00
tb
5396eaf5e5 Better fix for ntp breakage. Disable some code that was guarded
by defined(LIBRESSL_VERSION_NUMBER) but shouldn't have been for
some time now.

Pointed out by jsing
ok jca
2018-08-26 16:15:39 +00:00
tb
27012f61f2 Fix build after libcrypto bump.
ok sthen
2018-08-26 11:57:49 +00:00
sthen
6780b15bfc use AC_LANG_SOURCE instead of AC_LANG_PROGRAM to avoid a nested function
definition
2017-09-25 12:41:07 +00:00
bluhm
f36e4f7d4d Update ntp to 4.2.8p10.
CVE-2016-9042, CVE-2017-6451, CVE-2017-6452, CVE-2017-6455,
CVE-2017-6458, CVE-2017-6459, CVE-2017-6460, CVE-2017-6462,
CVE-2017-6463, CVE-2017-6464
Adapt OpenSSL #ifdef for LibreSSL.
Fix regression tests, prevent them from crashing.
OK deraadt@
2017-03-27 11:33:40 +00:00
naddy
441624ce8b Security update to 4.2.8p9:
CVE-2016-9311: Trap crash
CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS vector
CVE-2016-7427: Broadcast Mode Replay Prevention DoS
CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS
CVE-2016-9312: Windows: ntpd DoS by oversized UDP packet
CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass
CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal()
CVE-2016-7429: Interface selection attack
CVE-2016-7426: Client rate limiting and server responses
CVE-2016-7433: Reboot sync calculation problem
2016-12-14 20:05:37 +00:00
naddy
5cb1920e9a Update to 4.2.8p7 for the latest round of security fixes:
http://support.ntp.org/bin/view/Main/SecurityNotice#April_2016_NTP_4_2_8p7_Security
2016-04-27 09:16:55 +00:00
naddy
02b7008896 Security update to 4.2.8p6. This addresses numerous security issues. 2016-02-04 19:55:13 +00:00
sthen
d237b6cb3b security update to ntp-4.2.8p2
http://support.ntp.org/bin/view/Main/SecurityNotice#Recent_Vulnerabilities

CVE-2015-1798 "When ntpd is configured to use a symmetric key to authenticate a
remote NTP server/peer, it checks if the NTP message authentication code (MAC)
in received packets is valid, but not if there actually is any MAC included."

CVE-2015-1799 "An attacker knowing that NTP hosts A and B are peering with each
other (symmetric association) can send a packet to host A with source address
of B which will set the NTP state variables on A to the values sent by the
attacker. Host A will then send on its next poll to B a packet with originate
timestamp that doesn't match the transmit timestamp of B and the packet will be
dropped. If the attacker does this periodically for both hosts, they won't be
able to synchronize to each other."
2015-04-08 14:12:44 +00:00
jca
b26c4cef49 Update to ntp-4.2.8, fixes for several CVEs.
- Weak default key in config_auth() - CVE-2014-9293
- non-cryptographic random number generator with weak seed used by
  ntp-keygen to generate symmetric keys - CVE-2014-9294
- Buffer overflow in crypto_recv() - CVE-2014-9295
- Buffer overflow in ctl_putdata() - CVE-2014-9295
- Buffer overflow in configure() - CVE-2014-9295
- receive(): missing return on error - CVE-2014-9296

ok naddy@
2014-12-24 14:05:25 +00:00
jca
dcbb7fb25c Update to ntp-4.2.8, fixes for several CVEs.
- Weak default key in config_auth() - CVE-2014-9293
- non-cryptographic random number generator with weak seed used by
  ntp-keygen to generate symmetric keys - CVE-2014-9294
- Buffer overflow in crypto_recv() - CVE-2014-9295
- Buffer overflow in ctl_putdata() - CVE-2014-9295
- Buffer overflow in configure() - CVE-2014-9295
- receive(): missing return on error - CVE-2014-9296

ok naddy@
2014-12-24 13:10:20 +00:00
sthen
8178f9fa56 Update ports/net/ntp to 4.2.7p418. This is ntp.org's ntp daemon, *not*
the base system's openntpd.

Update removes a reflected unauthenticated DoS attack vector that has
been hit a lot in the wild recently, see http://www.openntpproject.org/
UDP traffic amplification 19x.

This is a devel version from upstream, they have decided not to fix it in
the stable branch. Users running older versions should add "disable monitor"
to their config and restart, then verify that "monlist" in ntpdc does not
return a list.

ok aja@, missing build dep spotted by naddy
2014-02-09 21:36:46 +00:00
gonzalo
465cab857a remove patches/patch-ntpd_ntp_intres_c 2012-04-10 15:27:30 +00:00
gonzalo
4cf7f8dabb Update for ntp:
* I remove the patch patch-ntpd_ntp_intres_c because is applied upstream.
* We doesn't need USE_GROFF here.

OK naddy@, aja@
2012-04-10 15:06:29 +00:00
naddy
1f6f6d3a51 update to 4.2.6p2, which incorporates most of our patches 2010-07-10 19:48:32 +00:00
naddy
87b33f29ca update to 4.2.6p1 and remove a lot of cruft 2010-07-03 02:49:43 +00:00
naddy
f31431be18 SECURITY:
Fix a DoS attack from certain NTP mode 7 packets.  If an attacker
spoofed a source address, ntpd hosts could be made to endlessly
send responses to each other or to themselves.  CVE-2009-3563.
2010-01-20 20:43:59 +00:00
naddy
18b76430e6 SECURITY update to 4.2.4p7:
Fix remote exploit if autokey is enabled (CVE-2009-1252).
2009-05-23 16:32:29 +00:00
naddy
8150ccb354 Security:
Prevent a buffer overflow in ntpq.  (CVE-2009-0159)
From upstream via FreeBSD.
2009-04-20 15:32:38 +00:00
naddy
f954712cb7 update to 4.2.4p5; based on a submission by Wim Lewis <wiml@hhhh.org> 2009-01-26 23:26:02 +00:00
sturm
3fcc829ef4 SECURITY:
fix gid confusion when starting ntpd with -u groupname
CAN-2005-2496
2006-01-24 19:58:58 +00:00
danh
3ef8ad64f5 resolve conflicts from last import 2004-06-05 04:54:53 +00:00
danh
edf7da51d6 import of ntp-stable-4.2.0a-20040525 2004-06-05 04:34:19 +00:00
danh
930cb22e5b resolve conflict from last import and remove files that are no longer
needed.
2003-02-23 21:32:41 +00:00
danh
2e35b91ddb - fix an off by one in ntpd/ntp_config.c
- bump package patch level

From cloder@, poked by brad@
2002-11-19 16:49:03 +00:00
danh
8f4bc886d8 enable mlockall on i386 again 2002-05-17 15:58:10 +00:00
danh
92f673c891 use getifaddrs/freeifaddrs if available
based on suggestion and patches from millert@
2002-05-11 20:58:14 +00:00
danh
7a84297a59 update to ntp 4.1.72
- no longer need patches for RAND_file_name; it was fixed in -current
2001-12-20 21:07:21 +00:00
danh
67d7745f65 correct another instance of RAND_file_name usage 2001-12-20 15:00:09 +00:00
danh
ff3fdbc687 * bump patch level of ntp package
* check return of RAND_file_name better; allows ntp-genkeys to continue
  if a seed file is not found.
* regen configure patch
* quote package comments
* files/md5 -> distinfo
2001-12-20 06:14:15 +00:00
danh
cade31876e update to ntp 4.1.0 2001-08-10 19:08:51 +00:00
danh
76bfcd7a0a update to version 4.0.99k23 2001-04-19 14:51:27 +00:00
danh
bb1525b92f better fix 2001-04-06 13:40:17 +00:00
danh
1569bd5bde pull in security patch from FreeBSD 2001-04-05 13:56:54 +00:00
wilfried
468c74233f mlockall broken on i386 2001-03-30 17:49:03 +00:00
danh
aad0cab858 play nice with new libreadline 2001-03-24 17:31:23 +00:00