[chrony-dev] [GIT] chrony/chrony.git branch, 1.31-security, updated. 1.31.1-4-gaabb564 |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-dev Archives
]
This is an automated email from git. It was enerated because a ref
change was pushed to the repository "chrony/chrony.git".
The branch, 1.31-security has been updated
via aabb56432088ce0e14c0fe3016b4751cc9247977 (commit)
via df46e5ca5d70be1c0ae037f96b4b038362703832 (commit)
via 370ba5e8fc7e18e3b19f18c4a35f0e439597426b (commit)
from 463093803de86931165c2d7f76355ab0733f5f3c (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit aabb56432088ce0e14c0fe3016b4751cc9247977
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Jan 11 15:42:36 2016 +0100
doc: update NEWS
commit df46e5ca5d70be1c0ae037f96b4b038362703832
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Fri Jan 8 15:03:09 2016 +0100
ntp: restrict authentication of server/peer to specified key
When a server/peer was specified with a key number to enable
authentication with a symmetric key, packets received from the
server/peer were accepted if they were authenticated with any of
the keys contained in the key file and not just the specified key.
This allowed an attacker who knew one key of a client/peer to modify
packets from its servers/peers that were authenticated with other
keys in a man-in-the-middle (MITM) attack. For example, in a network
where each NTP association had a separate key and all hosts had only
keys they needed, a client of a server could not attack other clients
of the server, but it could attack the server and also attack its own
clients (i.e. modify packets from other servers).
To not allow the server/peer to be authenticated with other keys
extend the authentication test to check if the key ID in the received
packet is equal to the configured key number. As a consequence, it's
no longer possible to authenticate two peers to each other with two
different keys, both peers have to be configured to use the same key.
This issue was discovered by Matt Street of Cisco ASIG.
commit 370ba5e8fc7e18e3b19f18c4a35f0e439597426b
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Fri Apr 10 10:35:21 2015 +0200
doc: warn that unauthenticated peers are vulnerable to DoS attack
-----------------------------------------------------------------------
Summary of changes:
NEWS | 7 +++++++
chrony.texi.in | 18 ++++++++++++++++++
ntp_core.c | 3 ++-
3 files changed, 27 insertions(+), 1 deletion(-)
hooks/post-receive
--
chrony/chrony.git
--
To unsubscribe email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "unsubscribe" in the subject.
For help email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.