Date: Thu, 22 Dec 2016 16:27:54 +0000 (UTC) From: Xin LI <delphij@FreeBSD.org> To: doc-committers@freebsd.org, svn-doc-all@freebsd.org, svn-doc-head@freebsd.org Subject: svn commit: r49757 - in head/share: security/advisories security/patches/SA-16:39 xml Message-ID: <201612221627.uBMGRsQ3027171@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: delphij Date: Thu Dec 22 16:27:54 2016 New Revision: 49757 URL: https://svnweb.freebsd.org/changeset/doc/49757 Log: Add SA-16:39. Added: head/share/security/advisories/FreeBSD-SA-16:39.ntp.asc (contents, props changed) head/share/security/patches/SA-16:39/ head/share/security/patches/SA-16:39/ntp-10.x.patch (contents, props changed) head/share/security/patches/SA-16:39/ntp-10.x.patch.asc (contents, props changed) head/share/security/patches/SA-16:39/ntp-11.0.patch (contents, props changed) head/share/security/patches/SA-16:39/ntp-11.0.patch.asc (contents, props changed) head/share/security/patches/SA-16:39/ntp-9.3.patch (contents, props changed) head/share/security/patches/SA-16:39/ntp-9.3.patch.asc (contents, props changed) Modified: head/share/xml/advisories.xml Added: head/share/security/advisories/FreeBSD-SA-16:39.ntp.asc ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/advisories/FreeBSD-SA-16:39.ntp.asc Thu Dec 22 16:27:54 2016 (r49757) @@ -0,0 +1,239 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA512 + +============================================================================= +FreeBSD-SA-16:39.ntp Security Advisory + The FreeBSD Project + +Topic: Multiple vulnerabilities of ntp + +Category: contrib +Module: ntp +Announced: XXXX-XX-XX +Credits: Network Time Foundation +Affects: All supported versions of FreeBSD. +Corrected: 2016-11-22 16:22:51 UTC (stable/11, 11.0-STABLE) + 2016-12-22 16:19:05 UTC (releng/11.0, 11.0-RELEASE-p6) + 2016-11-22 16:23:20 UTC (stable/10, 10.3-STABLE) + 2016-12-22 16:19:05 UTC (releng/10.3, 10.3-RELEASE-p15) + 2016-12-22 16:19:05 UTC (releng/10.2, 10.2-RELEASE-p28) + 2016-12-22 16:19:05 UTC (releng/10.1, 10.1-RELEASE-p45) + 2016-11-22 16:23:46 UTC (stable/9, 9.3-STABLE) + 2016-12-22 16:19:05 UTC (releng/9.3, 9.3-RELEASE-p53) +CVE Name: CVE-2016-7426, CVE-2016-7427, CVE-2016-7428, CVE-2016-7431, + CVE-2016-7433, CVE-2016-7434, CVE-2016-9310, CVE-2016-9311 + +For general information regarding FreeBSD Security Advisories, +including descriptions of the fields above, security branches, and the +following sections, please visit <URL:https://security.FreeBSD.org/>. + +I. Background + +The ntpd(8) daemon is an implementation of the Network Time Protocol (NTP) +used to synchronize the time of a computer system to a reference time +source. + +Trap is a mechanism to collect NTP daemon information from remote. + +II. Problem Description + +Multiple vulnerabilities have been discovered in the NTP suite: + +CVE-2016-9311: Trap crash, Reported by Matthew Van Gundy of Cisco ASIG. + +CVE-2016-9310: Mode 6 unauthenticated trap information disclosure and DDoS +vector. Reported by Matthew Van Gundy of Cisco ASIG. + +CVE-2016-7427: Broadcast Mode Replay Prevention DoS. Reported by +Matthew Van Gundy of Cisco ASIG. + +CVE-2016-7428: Broadcast Mode Poll Interval Enforcement DoS. Reported by +Matthew Van Gundy of Cisco ASIG. + +CVE-2016-7431: Regression: 010-origin: Zero Origin Timestamp Bypass. +Reported by Sharon Goldberg and Aanchal Malhotra of Boston University. + +CVE-2016-7434: Null pointer dereference in _IO_str_init_static_internal(). +Reported by Magnus Stubman. + +CVE-2016-7426: Client rate limiting and server responses. Reported by +Miroslav Lichvar of Red Hat. + +CVE-2016-7433: Reboot sync calculation problem. Reported independently +by Brian Utterback of Oracle, and by Sharon Goldberg and Aanchal Malhotra +of Boston University. + +III. Impact + +A remote attacker who can send a specially crafted packet to cause a +NULL pointer dereference that will crash ntpd, resulting in a Denial of +Service. [CVE-2016-9311] + +An exploitable configuration modification vulnerability exists in the +control mode (mode 6) functionality of ntpd. If, against long-standing +BCP recommendations, "restrict default noquery ..." is not specified, +a specially crafted control mode packet can set ntpd traps, providing +information disclosure and DDoS amplification, and unset ntpd traps, +disabling legitimate monitoring by an attacker from remote. [CVE-2016-9310] + +An attacker with access to the NTP broadcast domain can periodically +inject specially crafted broadcast mode NTP packets into the broadcast +domain which, while being logged by ntpd, can cause ntpd to reject +broadcast mode packets from legitimate NTP broadcast servers. +[CVE-2016-7427] + +An attacker with access to the NTP broadcast domain can send specially +crafted broadcast mode NTP packets to the broadcast domain which, while +being logged by ntpd, will cause ntpd to reject broadcast mode packets +from legitimate NTP broadcast servers. [CVE-2016-7428] + +Origin timestamp problems were fixed in ntp 4.2.8p6. However, subsequent +timestamp validation checks introduced a regression in the handling of +some Zero origin timestamp checks. [CVE-2016-7431] + +If ntpd is configured to allow mrulist query requests from a server +that sends a crafted malicious packet, ntpd will crash on receipt of +that crafted malicious mrulist query packet. [CVE-2016-7434] + +An attacker who knows the sources (e.g., from an IPv4 refid in server +response) and knows the system is (mis)configured in this way can +periodically send packets with spoofed source address to keep the rate +limiting activated and prevent ntpd from accepting valid responses +from its sources. [CVE-2016-7426] + +Ntp Bug 2085 described a condition where the root delay was included +twice, causing the jitter value to be higher than expected. Due to +a misinterpretation of a small-print variable in The Book, the fix +for this problem was incorrect, resulting in a root distance that did +not include the peer dispersion. The calculations and formulas have +been reviewed and reconciled, and the code has been updated accordingly. +[CVE-2016-7433] + +IV. Workaround + +No workaround is available, but systems not running ntpd(8) are not +affected. Network administrators are advised to implement BCP-38, +which helps to reduce the risk associated with these attacks. + +V. Solution + +Perform one of the following: + +1) Upgrade your vulnerable system to a supported FreeBSD stable or +release / security branch (releng) dated after the correction date. + +The ntpd service has to be restarted after the update. A reboot is +recommended but not required. + +2) To update your vulnerable system via a binary patch: + +Systems running a RELEASE version of FreeBSD on the i386 or amd64 +platforms can be updated via the freebsd-update(8) utility: + +# freebsd-update fetch +# freebsd-update install + +The ntpd service has to be restarted after the update. A reboot is +recommended but not required. + +3) To update your vulnerable system via a source code patch: + +The following patches have been verified to apply to the applicable +FreeBSD release branches. + +a) Download the relevant patch from the location below, and verify the +detached PGP signature using your PGP utility. + +[FreeBSD 11.0] +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-11.0.patch +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-11.0.patch.asc +# gpg --verify ntp-11.0.patch.asc + +[FreeBSD 10.x] +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-10.x.patch +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-10.x.patch.asc +# gpg --verify ntp-10.x.patch.asc + +[FreeBSD 9.3] +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-9.3.patch +# fetch https://security.FreeBSD.org/patches/SA-16:39/ntp-9.3.patch.asc +# gpg --verify ntp-9.3.patch.asc + +b) Apply the patch. Execute the following commands as root: + +# cd /usr/src +# patch < /path/to/patch + +c) Recompile the operating system using buildworld and installworld as +described in <URL:https://www.FreeBSD.org/handbook/makeworld.html>. + +Restart the applicable daemons, or reboot the system. + +VI. Correction details + +The following list contains the correction revision numbers for each +affected branch. + +Branch/path Revision +- ------------------------------------------------------------------------- +stable/9/ r309009 +releng/9.3/ r310419 +stable/10/ r309008 +releng/10.1/ r310419 +releng/10.2/ r310419 +releng/10.3/ r310419 +stable/11/ r309007 +releng/11.0/ r310419 +- ------------------------------------------------------------------------- + +To see which files were modified by a particular revision, run the +following command, replacing NNNNNN with the revision number, on a +machine with Subversion installed: + +# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base + +Or visit the following URL, replacing NNNNNN with the revision number: + +<URL:https://svnweb.freebsd.org/base?view=revision&revision=NNNNNN> + +VII. References + +<URL:http://support.ntp.org/bin/view/Main/SecurityNotice#November_2016_ntp_4_2_8p9_NTP_Se> + +<URL:https://www.kb.cert.org/vuls/id/633847> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7427> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7428> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7431> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7434> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310> + +<URL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311> + +The latest revision of this advisory is available at +<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-16:39.ntp.asc> +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v2.1.16 (FreeBSD) + +iQIzBAEBCgAdFiEEHPf/b631yp++G4yy7Wfs1l3PaucFAlhb/kAACgkQ7Wfs1l3P +audQRhAA02Xpoz4mSF1Cz1gCgWAKpTNpB2fG5z8Pqv1q8BqdArr+ZH/G1g2L4E/b +Id/g8WUvpZLozTeuWMx/6dm/XCbI+OhbzasZp46Cak3o2LMB6v3OC43qVX8fQiiO +9GgCltR6I8V939MVFKxo+cdflqIwmguKdLJHvnin8mv8MAjXOG7rrAx+FqcQjJ5i +oATuFLj/A9kWDiRH4TAQr/rVRmJGmIQY2GpEMt7oB/1ho5HFGhIdNZLCuriIcAGZ +HpZJoNKmDHV3mOfM+C03e4otBaoX6asid2TiY5lnDMx4j+a+Gxdv5tWnt72Bn0X/ +EC5HWYjm7QFDg/hfrymBfT7cObuVKtdEJikkRw3huBy6RN6d4zsaTJFMIODl6sNs +zBE5+vrwcXiUrbic10RoVzeSEFdVh7C6Ji1OK/rsxXAbgs0zkoHua/nxO2fhdyHr +m3Mb59QE7TiM1zaMjks1QZXORo53CrGHrhE6Qi7sISO0SS4mWCOkulOZeNjXQ3xK +GFox3YV0WDZz4m7VjZQS6/pj+dO4sABVQ0mahydJJX35FVkdJuknv/98yxmYRuHG +jP9NTUEh6dGDT3w/57hGg7VIgTR47q3e6UbutrqNoxiV5Br465mb9LxMjngDW7bA +poe9XHFMCmFV96gYN2va2cENUM/PjWI8mHWjZShG5DCXMVnK64A= +=PDXk +-----END PGP SIGNATURE----- Added: head/share/security/patches/SA-16:39/ntp-10.x.patch ============================================================================== --- /dev/null 00:00:00 1970 (empty, because file is newly added) +++ head/share/security/patches/SA-16:39/ntp-10.x.patch Thu Dec 22 16:27:54 2016 (r49757) @@ -0,0 +1,17239 @@ +--- contrib/ntp/ChangeLog.orig ++++ contrib/ntp/ChangeLog +@@ -1,4 +1,73 @@ + --- ++(4.2.8p9) 2016/11/21 Released by Harlan Stenn <stenn@ntp.org> ++(4.2.8p9) 2016/MM/DD Released by Harlan Stenn <stenn@ntp.org> ++ ++* [Sec 3119] Trap crash <perlinger@ntp.org> ++* [Sec 3118] Mode 6 information disclosure and DDoS vector <perlinger@ntp.org> ++ - TRAP config via mode 6 packet requires AUTH now. ++* [Sec 3114] Broadcast Mode Replay Prevention DoS ++ - applied patches by Matthew Van Gundy. <perlinger@ntp.org> ++ - with bcpollbstep, tweaks and cleanup by stenn@ntp.org ++* [Sec 3113] Broadcast Mode Poll Interval Enforcement DoS <perlinger@ntp.org> ++ - applied fix as suggested by Matthew Van Gundy ++* [Sec 3110] Windows: ntpd DoS by oversized UDP packet ++ - fixed error handling for truncated UDP packets. <perlinger@ntp.org> ++* [Sec 3102] Zero origin issues. HStenn. ++* [Sec 3082] null pointer dereference in _IO_str_init_static_internal() ++ - more hardening to read_mru_list(). perlinger@ntp.org ++* [Sec 3072] Attack on interface selection <perlinger@ntp.org> ++ - implemented Miroslav Lichvars <mlichvar@redhat.com> suggestion ++ to skip interface updates based on incoming packets ++* [Bug 3142] bug in netmask prefix length detection <perlinger@ntp.org> ++* [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org ++* [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ - moved retry decision where it belongs. <perlinger@ntp.org> ++* [Bug 3125] NTPD doesn't fully start when ntp.conf entries are out of order ++ using the loopback-ppsapi-provider.dll <perlinger@ntp.org> ++* [Bug 3116] unit tests for NTP time stamp expansion. <perlinger@ntp.org> ++* [Bug 3100] ntpq can't retrieve daemon_version <perlinger@ntp.org> ++ - fixed extended sysvar lookup (bug introduced with bug 3008 fix) ++* [Bug 3095] Compatibility with openssl 1.1 <perlinger@ntp.org> ++ - applied patches by Kurt Roeckx <kurt@roeckx.be> to source ++ - added shim layer for SSL API calls with issues (both directions) ++* [Bug 3089] Serial Parser does not work anymore for hopfser like device ++ - simplified / refactored hex-decoding in driver. <perlinger@ntp.org> ++* [Bug 3084] update-leap mis-parses the leapfile name. HStenn. ++* [Bug 3068] Linker warnings when building on Solaris. perlinger@ntp.org ++ - applied patch thanks to Andrew Stormont <andyjstormont@gmail.com> ++* [Bug 3067] Root distance calculation needs improvement. HStenn. ++* [Bug 3066] NMEA clock ignores pps. perlinger@ntp.org ++ - PPS-HACK works again. ++* [Bug 3059] Potential buffer overrun from oversized hash <perlinger@ntp.org> ++ - applied patch by Brian Utterback <brian.utterback@oracle.com> ++* [Bug 3053] ntp_loopfilter.c frequency calc precedence error. Sarah White. ++* [Bug 3050] Fix for bug #2960 causes [...] spurious error message. ++ <perlinger@ntp.org> ++ - patches by Reinhard Max <max@suse.com> and Havard Eidnes <he@uninett.no> ++* [Bug 3047] Fix refclock_jjy C-DEX JST2000. abe@ntp.org ++ - Patch provided by Kuramatsu. ++* [Bug 3021] unity_fixture.c needs pragma weak <perlinger@ntp.org> ++ - removed unnecessary & harmful decls of 'setUp()' & 'tearDown()' ++* [Bug 3019] Windows: ERROR_HOST_UNREACHABLE block packet processing. ++ DMayer and JPerlinger. ++* [Bug 2998] sntp/tests/packetProcessing.c broken without openssl. JPerlinger ++* [Bug 2961] sntp/tests/packetProcessing.c assumes AUTOKEY. HStenn. ++* [Bug 2959] refclock_jupiter: gps week correction <perlinger@ntp.org> ++ - fixed GPS week expansion to work based on build date. Special thanks ++ to Craig Leres for initial patch and testing. ++* [Bug 2951] ntpd tests fail: multiple definition of `send_via_ntp_signd' ++ - fixed Makefile.am <perlinger@ntp.org> ++* [Bug 2689] ATOM driver processes last PPS pulse at startup, ++ even if it is very old <perlinger@ntp.org> ++ - make sure PPS source is alive before processing samples ++ - improve stability close to the 500ms phase jump (phase gate) ++* Fix typos in include/ntp.h. ++* Shim X509_get_signature_nid() if needed. ++* git author attribution cleanup ++* bk ignore file cleanup ++* remove locks in Windows IO, use rpc-like thread synchronisation instead ++ ++--- + (4.2.8p8) 2016/06/02 Released by Harlan Stenn <stenn@ntp.org> + + * [Sec 3042] Broadcast Interleave. HStenn. +@@ -19,7 +88,7 @@ + * Fix typo in ntp-wait and plot_summary. HStenn. + * Make sure we have an "author" file for git imports. HStenn. + * Update the sntp problem tests for MacOS. HStenn. +- ++ + --- + (4.2.8p7) 2016/04/26 Released by Harlan Stenn <stenn@ntp.org> + +--- contrib/ntp/CommitLog.orig ++++ contrib/ntp/CommitLog +@@ -1,3 +1,1866 @@ ++ChangeSet@1.3720, 2016-11-21 08:08:21-05:00, stenn@deacon.udel.edu ++ NTP_4_2_8P9 ++ TAG: NTP_4_2_8P9 ++ ++ ChangeLog@1.1852 +1 -0 ++ NTP_4_2_8P9 ++ ++ ntpd/invoke-ntp.conf.texi@1.203 +1 -1 ++ NTP_4_2_8P9 ++ ++ ntpd/invoke-ntp.keys.texi@1.192 +1 -1 ++ NTP_4_2_8P9 ++ ++ ntpd/invoke-ntpd.texi@1.508 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.conf.5man@1.237 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.conf.5mdoc@1.237 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.conf.html@1.187 +157 -154 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.conf.man.in@1.237 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.conf.mdoc.in@1.237 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.keys.5man@1.226 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.keys.5mdoc@1.226 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.keys.html@1.188 +21 -33 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.keys.man.in@1.226 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntp.keys.mdoc.in@1.226 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd-opts.c@1.530 +245 -245 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd-opts.h@1.529 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd.1ntpdman@1.337 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd.1ntpdmdoc@1.337 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd.html@1.181 +142 -186 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd.man.in@1.337 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpd/ntpd.mdoc.in@1.337 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpdc/invoke-ntpdc.texi@1.505 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc-opts.c@1.523 +106 -106 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc-opts.h@1.522 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc.1ntpdcman@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc.1ntpdcmdoc@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc.html@1.349 +75 -95 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc.man.in@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpdc/ntpdc.mdoc.in@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpq/invoke-ntpq.texi@1.513 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq-opts.c@1.530 +113 -113 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq-opts.h@1.528 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq.1ntpqman@1.341 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq.1ntpqmdoc@1.341 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq.html@1.178 +136 -160 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq.man.in@1.341 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpq/ntpq.mdoc.in@1.341 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/invoke-ntpsnmpd.texi@1.507 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd-opts.c@1.525 +67 -67 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd-opts.h@1.524 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd.1ntpsnmpdman@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd.1ntpsnmpdmdoc@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd.html@1.176 +10 -14 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd.man.in@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ ntpsnmpd/ntpsnmpd.mdoc.in@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ packageinfo.sh@1.532 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/calc_tickadj.1calc_tickadjman@1.97 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/calc_tickadj.1calc_tickadjmdoc@1.98 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/calc_tickadj.html@1.99 +30 -42 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/calc_tickadj.man.in@1.96 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/calc_tickadj.mdoc.in@1.98 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/calc_tickadj/invoke-calc_tickadj.texi@1.101 +1 -1 ++ NTP_4_2_8P9 ++ ++ scripts/invoke-plot_summary.texi@1.119 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/invoke-summary.texi@1.118 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/invoke-ntp-wait.texi@1.328 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait-opts@1.64 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait.1ntp-waitman@1.325 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait.1ntp-waitmdoc@1.326 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait.html@1.345 +41 -59 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait.man.in@1.325 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntp-wait/ntp-wait.mdoc.in@1.326 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/invoke-ntpsweep.texi@1.116 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep-opts@1.66 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep.1ntpsweepman@1.104 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep.1ntpsweepmdoc@1.104 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep.html@1.117 +46 -57 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep.man.in@1.104 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntpsweep/ntpsweep.mdoc.in@1.105 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/invoke-ntptrace.texi@1.117 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace-opts@1.66 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace.1ntptraceman@1.104 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace.1ntptracemdoc@1.105 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace.html@1.118 +38 -47 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace.man.in@1.104 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/ntptrace/ntptrace.mdoc.in@1.106 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary-opts@1.67 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary.1plot_summaryman@1.117 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary.1plot_summarymdoc@1.117 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary.html@1.120 +40 -58 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary.man.in@1.117 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/plot_summary.mdoc.in@1.117 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/summary-opts@1.66 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/summary.1summaryman@1.116 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/summary.1summarymdoc@1.116 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/summary.html@1.119 +37 -49 ++ NTP_4_2_8P9 ++ ++ scripts/summary.man.in@1.116 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/summary.mdoc.in@1.116 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/invoke-update-leap.texi@1.17 +1 -1 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap-opts@1.17 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap.1update-leapman@1.17 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap.1update-leapmdoc@1.17 +2 -2 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap.html@1.17 +48 -72 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap.man.in@1.17 +3 -3 ++ NTP_4_2_8P9 ++ ++ scripts/update-leap/update-leap.mdoc.in@1.17 +2 -2 ++ NTP_4_2_8P9 ++ ++ sntp/invoke-sntp.texi@1.505 +2 -2 ++ NTP_4_2_8P9 ++ ++ sntp/sntp-opts.c@1.524 +158 -158 ++ NTP_4_2_8P9 ++ ++ sntp/sntp-opts.h@1.522 +3 -3 ++ NTP_4_2_8P9 ++ ++ sntp/sntp.1sntpman@1.340 +3 -3 ++ NTP_4_2_8P9 ++ ++ sntp/sntp.1sntpmdoc@1.340 +2 -2 ++ NTP_4_2_8P9 ++ ++ sntp/sntp.html@1.520 +111 -135 ++ NTP_4_2_8P9 ++ ++ sntp/sntp.man.in@1.340 +3 -3 ++ NTP_4_2_8P9 ++ ++ sntp/sntp.mdoc.in@1.340 +2 -2 ++ NTP_4_2_8P9 ++ ++ util/invoke-ntp-keygen.texi@1.508 +2 -2 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen-opts.c@1.526 +172 -172 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen-opts.h@1.524 +3 -3 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen.1ntp-keygenman@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen.1ntp-keygenmdoc@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen.html@1.182 +157 -216 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen.man.in@1.336 +3 -3 ++ NTP_4_2_8P9 ++ ++ util/ntp-keygen.mdoc.in@1.336 +2 -2 ++ NTP_4_2_8P9 ++ ++ChangeSet@1.3719, 2016-11-21 07:07:04-05:00, stenn@deacon.udel.edu ++ ntp-4.2.8p9 ++ ++ packageinfo.sh@1.531 +1 -1 ++ ntp-4.2.8p9 ++ ++ChangeSet@1.3718, 2016-11-21 03:47:58+00:00, stenn@psp-deb1.ntp.org ++ NEWS updates, final p9 testing ++ ++ NEWS@1.203 +25 -17 ++ NEWS updates, final p9 testing ++ ++ packageinfo.sh@1.530 +2 -2 ++ NEWS updates, final p9 testing ++ ++ChangeSet@1.3717, 2016-11-18 10:33:02+00:00, stenn@psp-deb1.ntp.org ++ NEWS update for 3142 ++ ++ NEWS@1.202 +2 -1 ++ NEWS update for 3142 ++ ++ChangeSet@1.3686.23.1, 2016-11-18 08:55:13+01:00, perlinger@ntp.org ++ [Bug 3142] bug in netmask prefix length detection ++ ++ ChangeLog@1.1834.23.1 +3 -0 ++ [Bug 3142] bug in netmask prefix length detection ++ ++ lib/isc/netaddr.c@1.15 +0 -1 ++ [Bug 3142] bug in netmask prefix length detection ++ ++ChangeSet@1.3715, 2016-11-16 21:25:49-08:00, harlan@fb-x86-a.pfcs.com ++ NEWS file update ++ ++ NEWS@1.201 +7 -22 ++ NEWS file update ++ ++ChangeSet@1.3707.1.1, 2016-11-13 21:59:31-08:00, harlan@fb-x86-a.pfcs.com ++ cleanup ++ ++ NEWS@1.197.1.1 +201 -77 ++ cleanup ++ ++ChangeSet@1.3713, 2016-11-13 21:56:18-08:00, harlan@hms-mbp11.pfcs.com ++ cleanip ++ ++ ChangeLog@1.1850 +2 -0 ++ cleanip ++ ++ChangeSet@1.3712, 2016-11-13 02:43:02+00:00, stenn@psp-deb1.ntp.org ++ NEWS updates ++ ++ NEWS@1.199 +17 -0 ++ NEWS updates ++ ++ChangeSet@1.3710, 2016-11-13 02:30:31+00:00, stenn@psp-deb1.ntp.org ++ NEWS cleanup ++ ++ NEWS@1.198 +2 -0 ++ NEWS cleanup ++ ++ChangeSet@1.3707, 2016-11-12 17:36:54-08:00, harlan@fb-x86-a.pfcs.com ++ NEWS cleanup ++ ++ NEWS@1.197 +41 -6 ++ NEWS cleanup ++ ++ChangeSet@1.3706, 2016-11-12 16:55:59-08:00, harlan@fb-x86-a.pfcs.com ++ [Bug 3067] Root distance calculation needs improvement. HStenn ++ ++ ChangeLog@1.1846.1.2 +1 -0 ++ [Bug 3067] Root distance calculation needs improvement. HStenn ++ ++ NEWS@1.196 +1 -0 ++ [Bug 3067] Root distance calculation needs improvement. HStenn ++ ++ ntpd/ntp_proto.c@1.396 +16 -11 ++ [Bug 3067] Root distance calculation needs improvement. HStenn ++ ++ChangeSet@1.3705, 2016-11-12 15:57:34-08:00, harlan@fb-x86-a.pfcs.com ++ [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org ++ ++ ChangeLog@1.1846.1.1 +1 -0 ++ [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org ++ ++ NEWS@1.195 +1 -0 ++ [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org ++ ++ ntpd/refclock_gpsdjson.c@1.25 +1 -1 ++ [Bug 3138] gpsdjson refclock should honor fudgetime1. stenn@ntp.org ++ ++ChangeSet@1.3686.22.1, 2016-11-12 05:54:39+01:00, perlinger@ntp.org ++ [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ ++ ChangeLog@1.1834.22.1 +4 -0 ++ [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ ++ include/ntp_intres.h@1.2 +6 -0 ++ [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ - add flags and prototype for 'getaddrinfo_sometime_ex()' ++ ++ libntp/ntp_intres.c@1.101 +48 -14 ++ [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ - implement 'getaddrinfo_sometime_ex()', support ignoring all errors ++ ++ ntpd/ntp_config.c@1.338.1.1 +11 -10 ++ [Bug 3129] Unknown hosts can put resolver thread into a hard loop ++ - move decison about igoring DNS errors to resolver code ++ ++ChangeSet@1.3703.1.2, 2016-11-09 12:32:07+00:00, stenn@psp-deb1.ntp.org ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ChangeLog@1.1848 +1 -1 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ html/miscopt.html@1.87 +4 -2 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ include/ntp.h@1.223 +1 -0 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ include/ntpd.h@1.194 +1 -0 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/complete.conf.in@1.32 +1 -1 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/invoke-ntp.conf.texi@1.202 +16 -1 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/keyword-gen-utd@1.29 +1 -1 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/keyword-gen.c@1.35 +1 -0 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp.conf.5man@1.236 +29 -8 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp.conf.5mdoc@1.236 +21 -2 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp.conf.def@1.25 +19 -0 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp.conf.man.in@1.236 +29 -8 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp.conf.mdoc.in@1.236 +21 -2 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_config.c@1.339 +15 -0 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_keyword.h@1.31 +1068 -1058 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_parser.c@1.103 +1196 -1193 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_parser.h@1.67 +373 -371 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_parser.y@1.93 +3 -1 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ ntpd/ntp_proto.c@1.394.1.2 +43 -26 ++ [Bug 3114] bcpollbstep, tweaks and cleanup ++ ++ChangeSet@1.3703, 2016-11-09 06:06:04+00:00, stenn@psp-deb1.ntp.org ++ typo ++ ++ ChangeLog@1.1846 +1 -1 ++ typo ++ ++ChangeSet@1.3686.21.1, 2016-11-08 20:01:41+01:00, perlinger@ntp.org ++ [Bug 3089] Serial Parser does not work anymore for hopfser like device ++ ++ ChangeLog@1.1834.21.1 +4 -0 ++ [Bug 3089] Serial Parser does not work anymore for hopfser like device ++ ++ libparse/clk_hopf6021.c@1.13 +43 -25 ++ [Bug 3089] Serial Parser does not work anymore for hopfser like device ++ - simplified / refactored hex-decoding in driver. ++ ++ChangeSet@1.3698.2.1, 2016-11-03 17:02:24-07:00, harlan@max.pfcs.com ++ Added leap smear/root dispersion comment ++ ++ ntpd/ntp_proto.c@1.393.1.1 +4 -0 ++ Added leap smear/root dispersion comment ++ ++ChangeSet@1.3699.1.2, 2016-10-31 10:56:33+00:00, stenn@psp-deb1.ntp.org ++ Add bug 3125 to the NEWS file ++ ++ NEWS@1.194 +2 -0 ++ Add bug 3125 to the NEWS file ++ ++ChangeSet@1.3701, 2016-10-24 07:37:25+02:00, perlinger@ntp.org ++ [winio2 - unlocked] ++ - the great lock removal ++ - the great renaming ++ ++ ChangeLog@1.1844 +1 -0 ++ [winio2 - unlocked] notes on changes ++ ++ ntpd/ntp_refclock.c@1.123 +1 -1 ++ [winio2 - unlocked] ++ - whitespace at EOL ++ ++ ports/winnt/include/ntp_iocpltypes.h@1.3 +21 -24 ++ [winio2 - unlocked] ++ - eliminate critical section, simplify API ++ - the great renaming ++ ++ ports/winnt/ntpd/ntp_iocompletionport.c@1.77 +331 -209 ++ [winio2 - unlocked] ++ - the great lock removal ++ - handle context objects are only manipulated by IOCPL thread ++ - closing handles is done by main thread after informing IOCPL thread (RPC-style) ++ - the great renaming ++ - restructured UNIX line mode emulation ++ ++ ports/winnt/ntpd/ntp_iocpltypes.c@1.3 +31 -95 ++ [winio2 - unlocked] ++ - eliminate critical section, simplify API ++ - the great renaming ++ ++ ++ChangeSet@1.3698.1.7, 2016-10-23 05:18:04+00:00, stenn@psp-deb1.ntp.org ++ ntp-4.2.8p9-PRE ++ ++ ntpd/invoke-ntp.conf.texi@1.201 +1 -1 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/invoke-ntp.keys.texi@1.191 +1 -1 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/invoke-ntpd.texi@1.507 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.conf.5man@1.235 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.conf.5mdoc@1.235 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.conf.html@1.186 +104 -91 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.conf.man.in@1.235 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.conf.mdoc.in@1.235 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.keys.5man@1.225 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.keys.5mdoc@1.225 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.keys.html@1.187 +29 -17 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.keys.man.in@1.225 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntp.keys.mdoc.in@1.225 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd-opts.c@1.529 +245 -245 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd-opts.h@1.528 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd.1ntpdman@1.336 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd.1ntpdmdoc@1.336 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd.html@1.180 +146 -102 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd.man.in@1.336 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpd/ntpd.mdoc.in@1.336 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/invoke-ntpdc.texi@1.504 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc-opts.c@1.522 +106 -106 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc-opts.h@1.521 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc.1ntpdcman@1.335 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc.1ntpdcmdoc@1.335 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc.html@1.348 +77 -57 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc.man.in@1.335 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpdc/ntpdc.mdoc.in@1.335 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/invoke-ntpq.texi@1.512 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq-opts.c@1.529 +113 -113 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq-opts.h@1.527 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq.1ntpqman@1.340 +3 -3 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq.1ntpqmdoc@1.340 +2 -2 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq.html@1.177 +129 -105 ++ ntp-4.2.8p9-PRE ++ ++ ntpq/ntpq.man.in@1.340 +3 -3 *** DIFF OUTPUT TRUNCATED AT 1000 LINES ***
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201612221627.uBMGRsQ3027171>