Compare commits
4 commits
master
...
1.23-secur
Author | SHA1 | Date | |
---|---|---|---|
|
d99c4736c2 | ||
|
2f63cf4485 | ||
|
0b710499f9 | ||
|
7864c7a70c |
10 changed files with 158 additions and 36 deletions
9
NEWS
9
NEWS
|
@ -1,3 +1,12 @@
|
||||||
|
New in version 1.23.1
|
||||||
|
=====================
|
||||||
|
|
||||||
|
Security fixes
|
||||||
|
--------------
|
||||||
|
* Don't reply to invalid cmdmon packets (CVE-2010-0292)
|
||||||
|
* Limit client log memory size (CVE-2010-0293)
|
||||||
|
* Limit rate of syslog messages (CVE-2010-0294)
|
||||||
|
|
||||||
New in version 1.23
|
New in version 1.23
|
||||||
===================
|
===================
|
||||||
|
|
||||||
|
|
16
chrony.texi
16
chrony.texi
|
@ -1177,6 +1177,7 @@ directives can occur in any order in the file.
|
||||||
* manual directive:: Allow manual entry using chronyc's settime cmd.
|
* manual directive:: Allow manual entry using chronyc's settime cmd.
|
||||||
* maxupdateskew directive:: Stop bad estimates upsetting machine clock
|
* maxupdateskew directive:: Stop bad estimates upsetting machine clock
|
||||||
* noclientlog directive:: Prevent chronyd from gathering data about clients
|
* noclientlog directive:: Prevent chronyd from gathering data about clients
|
||||||
|
* clientloglimit directive:: Set client log memory limit
|
||||||
* peer directive:: Specify an NTP peer
|
* peer directive:: Specify an NTP peer
|
||||||
* pidfile directive:: Specify the file where chronyd's pid is written
|
* pidfile directive:: Specify the file where chronyd's pid is written
|
||||||
* port directive:: Set port to use for NTP packets
|
* port directive:: Set port to use for NTP packets
|
||||||
|
@ -2066,6 +2067,21 @@ This directive, which takes no arguments, specifies that client accesses
|
||||||
are not to be logged. Normally they are logged, allowing statistics to
|
are not to be logged. Normally they are logged, allowing statistics to
|
||||||
be reported using the @code{clients} command in @code{chronyc}.
|
be reported using the @code{clients} command in @code{chronyc}.
|
||||||
@c }}}
|
@c }}}
|
||||||
|
@c {{{ clientloglimit
|
||||||
|
@node clientloglimit directive
|
||||||
|
@subsection clientloglimit
|
||||||
|
This directive specifies the maximum size of the memory allocated to
|
||||||
|
log client accesses. When the limit is reached, only information for
|
||||||
|
clients that have already been logged will be updated. If 0 is
|
||||||
|
specified, the memory size will be unlimited. The default is 524288
|
||||||
|
bytes.
|
||||||
|
|
||||||
|
An example of the use of this directive is
|
||||||
|
|
||||||
|
@example
|
||||||
|
clientloglimit 1048576
|
||||||
|
@end example
|
||||||
|
@c }}}
|
||||||
@c {{{ peer
|
@c {{{ peer
|
||||||
@node peer directive
|
@node peer directive
|
||||||
@subsection peer
|
@subsection peer
|
||||||
|
|
39
clientlog.c
39
clientlog.c
|
@ -40,6 +40,7 @@
|
||||||
#include "memory.h"
|
#include "memory.h"
|
||||||
#include "reports.h"
|
#include "reports.h"
|
||||||
#include "util.h"
|
#include "util.h"
|
||||||
|
#include "logging.h"
|
||||||
|
|
||||||
/* Number of bits of address per layer of the table. This value has
|
/* Number of bits of address per layer of the table. This value has
|
||||||
been chosen on the basis that a server will predominantly be serving
|
been chosen on the basis that a server will predominantly be serving
|
||||||
|
@ -86,6 +87,13 @@ static int max_nodes = 0;
|
||||||
/* Flag indicating whether facility is turned on or not */
|
/* Flag indicating whether facility is turned on or not */
|
||||||
static int active = 0;
|
static int active = 0;
|
||||||
|
|
||||||
|
/* Flag indicating whether memory allocation limit has been reached
|
||||||
|
and no new nodes or subnets should be allocated */
|
||||||
|
static int alloc_limit_reached;
|
||||||
|
|
||||||
|
static unsigned long alloc_limit;
|
||||||
|
static unsigned long alloced;
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
|
||||||
static void
|
static void
|
||||||
|
@ -128,6 +136,9 @@ CLG_Initialise(void)
|
||||||
max_nodes = 0;
|
max_nodes = 0;
|
||||||
n_nodes = 0;
|
n_nodes = 0;
|
||||||
|
|
||||||
|
alloced = 0;
|
||||||
|
alloc_limit = CNF_GetClientLogLimit();
|
||||||
|
alloc_limit_reached = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
@ -140,11 +151,25 @@ CLG_Finalise(void)
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
|
||||||
|
static void check_alloc_limit() {
|
||||||
|
if (alloc_limit_reached)
|
||||||
|
return;
|
||||||
|
|
||||||
|
if (alloced >= alloc_limit) {
|
||||||
|
LOG(LOGS_WARN, LOGF_ClientLog, "Client log memory limit reached");
|
||||||
|
alloc_limit_reached = 1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ================================================== */
|
||||||
|
|
||||||
static void
|
static void
|
||||||
create_subnet(Subnet *parent_subnet, int the_entry)
|
create_subnet(Subnet *parent_subnet, int the_entry)
|
||||||
{
|
{
|
||||||
parent_subnet->entry[the_entry] = (void *) MallocNew(Subnet);
|
parent_subnet->entry[the_entry] = (void *) MallocNew(Subnet);
|
||||||
clear_subnet((Subnet *) parent_subnet->entry[the_entry]);
|
clear_subnet((Subnet *) parent_subnet->entry[the_entry]);
|
||||||
|
alloced += sizeof (Subnet);
|
||||||
|
check_alloc_limit();
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
@ -157,6 +182,8 @@ create_node(Subnet *parent_subnet, int the_entry)
|
||||||
parent_subnet->entry[the_entry] = (void *) new_node;
|
parent_subnet->entry[the_entry] = (void *) new_node;
|
||||||
clear_node(new_node);
|
clear_node(new_node);
|
||||||
|
|
||||||
|
alloced += sizeof (Node);
|
||||||
|
|
||||||
if (n_nodes == max_nodes) {
|
if (n_nodes == max_nodes) {
|
||||||
if (nodes) {
|
if (nodes) {
|
||||||
max_nodes += NODE_TABLE_INCREMENT;
|
max_nodes += NODE_TABLE_INCREMENT;
|
||||||
|
@ -168,8 +195,10 @@ create_node(Subnet *parent_subnet, int the_entry)
|
||||||
max_nodes = NODE_TABLE_INCREMENT;
|
max_nodes = NODE_TABLE_INCREMENT;
|
||||||
nodes = MallocArray(Node *, max_nodes);
|
nodes = MallocArray(Node *, max_nodes);
|
||||||
}
|
}
|
||||||
|
alloced += sizeof (Node *) * (max_nodes - n_nodes);
|
||||||
}
|
}
|
||||||
nodes[n_nodes++] = (Node *) new_node;
|
nodes[n_nodes++] = (Node *) new_node;
|
||||||
|
check_alloc_limit();
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
@ -195,11 +224,15 @@ find_subnet(Subnet *subnet, CLG_IP_Addr addr, int bits_left)
|
||||||
|
|
||||||
if (new_bits_left > 0) {
|
if (new_bits_left > 0) {
|
||||||
if (!subnet->entry[this_subnet]) {
|
if (!subnet->entry[this_subnet]) {
|
||||||
|
if (alloc_limit_reached)
|
||||||
|
return NULL;
|
||||||
create_subnet(subnet, this_subnet);
|
create_subnet(subnet, this_subnet);
|
||||||
}
|
}
|
||||||
return find_subnet((Subnet *) subnet->entry[this_subnet], new_subnet, new_bits_left);
|
return find_subnet((Subnet *) subnet->entry[this_subnet], new_subnet, new_bits_left);
|
||||||
} else {
|
} else {
|
||||||
if (!subnet->entry[this_subnet]) {
|
if (!subnet->entry[this_subnet]) {
|
||||||
|
if (alloc_limit_reached)
|
||||||
|
return NULL;
|
||||||
create_node(subnet, this_subnet);
|
create_node(subnet, this_subnet);
|
||||||
}
|
}
|
||||||
return subnet->entry[this_subnet];
|
return subnet->entry[this_subnet];
|
||||||
|
@ -248,6 +281,8 @@ CLG_LogNTPClientAccess (CLG_IP_Addr client, time_t now)
|
||||||
Node *node;
|
Node *node;
|
||||||
if (active) {
|
if (active) {
|
||||||
node = (Node *) find_subnet(&top_subnet, client, 32);
|
node = (Node *) find_subnet(&top_subnet, client, 32);
|
||||||
|
if (node == NULL)
|
||||||
|
return;
|
||||||
node->ip_addr = client;
|
node->ip_addr = client;
|
||||||
++node->client_hits;
|
++node->client_hits;
|
||||||
node->last_ntp_hit = now;
|
node->last_ntp_hit = now;
|
||||||
|
@ -262,6 +297,8 @@ CLG_LogNTPPeerAccess(CLG_IP_Addr client, time_t now)
|
||||||
Node *node;
|
Node *node;
|
||||||
if (active) {
|
if (active) {
|
||||||
node = (Node *) find_subnet(&top_subnet, client, 32);
|
node = (Node *) find_subnet(&top_subnet, client, 32);
|
||||||
|
if (node == NULL)
|
||||||
|
return;
|
||||||
node->ip_addr = client;
|
node->ip_addr = client;
|
||||||
++node->peer_hits;
|
++node->peer_hits;
|
||||||
node->last_ntp_hit = now;
|
node->last_ntp_hit = now;
|
||||||
|
@ -276,6 +313,8 @@ CLG_LogCommandAccess(CLG_IP_Addr client, CLG_Command_Type type, time_t now)
|
||||||
Node *node;
|
Node *node;
|
||||||
if (active) {
|
if (active) {
|
||||||
node = (Node *) find_subnet(&top_subnet, client, 32);
|
node = (Node *) find_subnet(&top_subnet, client, 32);
|
||||||
|
if (node == NULL)
|
||||||
|
return;
|
||||||
node->ip_addr = client;
|
node->ip_addr = client;
|
||||||
node->last_cmd_hit = now;
|
node->last_cmd_hit = now;
|
||||||
switch (type) {
|
switch (type) {
|
||||||
|
|
69
cmdmon.c
69
cmdmon.c
|
@ -654,7 +654,7 @@ transmit_reply(CMD_Reply *msg, struct sockaddr_in *where_to)
|
||||||
status = sendto(sock_fd, (void *) msg, tx_message_length, 0,
|
status = sendto(sock_fd, (void *) msg, tx_message_length, 0,
|
||||||
(struct sockaddr *) where_to, sizeof(struct sockaddr_in));
|
(struct sockaddr *) where_to, sizeof(struct sockaddr_in));
|
||||||
|
|
||||||
if (status < 0) {
|
if (status < 0 && !LOG_RateLimited()) {
|
||||||
remote_ip = ntohl(where_to->sin_addr.s_addr);
|
remote_ip = ntohl(where_to->sin_addr.s_addr);
|
||||||
remote_port = ntohs(where_to->sin_port);
|
remote_port = ntohs(where_to->sin_port);
|
||||||
LOG(LOGS_WARN, LOGF_CmdMon, "Could not send response to %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
LOG(LOGS_WARN, LOGF_CmdMon, "Could not send response to %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
||||||
|
@ -1593,6 +1593,7 @@ read_from_cmd_socket(void *anything)
|
||||||
int valid_ts;
|
int valid_ts;
|
||||||
int authenticated;
|
int authenticated;
|
||||||
int localhost;
|
int localhost;
|
||||||
|
int allowed;
|
||||||
unsigned short rx_command;
|
unsigned short rx_command;
|
||||||
unsigned long rx_message_token;
|
unsigned long rx_message_token;
|
||||||
unsigned long tx_message_token;
|
unsigned long tx_message_token;
|
||||||
|
@ -1642,20 +1643,43 @@ read_from_cmd_socket(void *anything)
|
||||||
|
|
||||||
localhost = (remote_ip == 0x7f000001UL);
|
localhost = (remote_ip == 0x7f000001UL);
|
||||||
|
|
||||||
if ((!ADF_IsAllowed(access_auth_table, remote_ip)) &&
|
allowed = ADF_IsAllowed(access_auth_table, remote_ip) || localhost;
|
||||||
(!localhost)) {
|
|
||||||
|
if ((read_length < offsetof(CMD_Request, data)) ||
|
||||||
|
(rx_message.version != PROTO_VERSION_NUMBER) ||
|
||||||
|
(rx_message.pkt_type != PKT_TYPE_CMD_REQUEST) ||
|
||||||
|
(rx_message.res1 != 0) ||
|
||||||
|
(rx_message.res2 != 0)) {
|
||||||
|
|
||||||
|
/* We don't know how to process anything like this */
|
||||||
|
if (allowed)
|
||||||
|
CLG_LogCommandAccess(remote_ip, CLG_CMD_BAD_PKT, cooked_now.tv_sec);
|
||||||
|
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (read_length != expected_length) {
|
||||||
|
if (!LOG_RateLimited()) {
|
||||||
|
LOG(LOGS_WARN, LOGF_CmdMon, "Read incorrectly sized packet from %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
||||||
|
}
|
||||||
|
if (allowed)
|
||||||
|
CLG_LogCommandAccess(remote_ip, CLG_CMD_BAD_PKT, cooked_now.tv_sec);
|
||||||
|
/* For now, just ignore the packet. We may want to send a reply
|
||||||
|
back eventually */
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (!allowed) {
|
||||||
/* The client is not allowed access, so don't waste any more time
|
/* The client is not allowed access, so don't waste any more time
|
||||||
on him. Note that localhost is always allowed access
|
on him. Note that localhost is always allowed access
|
||||||
regardless of the defined access rules - otherwise, we could
|
regardless of the defined access rules - otherwise, we could
|
||||||
shut ourselves out completely! */
|
shut ourselves out completely! */
|
||||||
|
|
||||||
/* We ought to find another way to log this, there is an attack
|
if (!LOG_RateLimited()) {
|
||||||
here against the host because an adversary can just keep
|
LOG(LOGS_WARN, LOGF_CmdMon, "Command packet received from unauthorised host %s port %d",
|
||||||
hitting us with bad packets until our log file(s) fill up. */
|
UTI_IPToDottedQuad(remote_ip),
|
||||||
|
remote_port);
|
||||||
LOG(LOGS_WARN, LOGF_CmdMon, "Command packet received from unauthorised host %s port %d",
|
}
|
||||||
UTI_IPToDottedQuad(remote_ip),
|
|
||||||
remote_port);
|
|
||||||
|
|
||||||
tx_message.status = htons(STT_NOHOSTACCESS);
|
tx_message.status = htons(STT_NOHOSTACCESS);
|
||||||
transmit_reply(&tx_message, &where_from);
|
transmit_reply(&tx_message, &where_from);
|
||||||
|
@ -1664,25 +1688,6 @@ read_from_cmd_socket(void *anything)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
if (read_length != expected_length) {
|
|
||||||
LOG(LOGS_WARN, LOGF_CmdMon, "Read incorrectly sized packet from %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
|
||||||
CLG_LogCommandAccess(remote_ip, CLG_CMD_BAD_PKT, cooked_now.tv_sec);
|
|
||||||
/* For now, just ignore the packet. We may want to send a reply
|
|
||||||
back eventually */
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
if ((rx_message.version != PROTO_VERSION_NUMBER) ||
|
|
||||||
(rx_message.pkt_type != PKT_TYPE_CMD_REQUEST) ||
|
|
||||||
(rx_message.res1 != 0) ||
|
|
||||||
(rx_message.res2 != 0)) {
|
|
||||||
|
|
||||||
/* We don't know how to process anything like this */
|
|
||||||
CLG_LogCommandAccess(remote_ip, CLG_CMD_BAD_PKT, cooked_now.tv_sec);
|
|
||||||
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
rx_command = ntohs(rx_message.command);
|
rx_command = ntohs(rx_message.command);
|
||||||
|
|
||||||
/* OK, we have a valid message. Now dispatch on message type and process it. */
|
/* OK, we have a valid message. Now dispatch on message type and process it. */
|
||||||
|
@ -1759,7 +1764,7 @@ read_from_cmd_socket(void *anything)
|
||||||
tx_message_length = PKL_ReplyLength(prev_tx_message);
|
tx_message_length = PKL_ReplyLength(prev_tx_message);
|
||||||
status = sendto(sock_fd, (void *) prev_tx_message, tx_message_length, 0,
|
status = sendto(sock_fd, (void *) prev_tx_message, tx_message_length, 0,
|
||||||
(struct sockaddr *) &where_from, sizeof(where_from));
|
(struct sockaddr *) &where_from, sizeof(where_from));
|
||||||
if (status < 0) {
|
if (status < 0 && !LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_CmdMon, "Could not send response to %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
LOG(LOGS_WARN, LOGF_CmdMon, "Could not send response to %s:%hu", UTI_IPToDottedQuad(remote_ip), remote_port);
|
||||||
}
|
}
|
||||||
return;
|
return;
|
||||||
|
@ -1809,7 +1814,7 @@ read_from_cmd_socket(void *anything)
|
||||||
tx_message.status = htons(STT_INVALID);
|
tx_message.status = htons(STT_INVALID);
|
||||||
tx_message.reply = htons(RPY_NULL);
|
tx_message.reply = htons(RPY_NULL);
|
||||||
} else {
|
} else {
|
||||||
int allowed = 0;
|
allowed = 0;
|
||||||
|
|
||||||
/* Check level of authority required to issue the command */
|
/* Check level of authority required to issue the command */
|
||||||
switch(permissions[rx_command]) {
|
switch(permissions[rx_command]) {
|
||||||
|
@ -1879,7 +1884,7 @@ read_from_cmd_socket(void *anything)
|
||||||
|
|
||||||
case REQ_LOGON:
|
case REQ_LOGON:
|
||||||
/* If the log-on fails, record the reason why */
|
/* If the log-on fails, record the reason why */
|
||||||
if (!issue_token) {
|
if (!issue_token && !LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_CmdMon,
|
LOG(LOGS_WARN, LOGF_CmdMon,
|
||||||
"Bad command logon from %s port %d (md5_ok=%d valid_ts=%d)\n",
|
"Bad command logon from %s port %d (md5_ok=%d valid_ts=%d)\n",
|
||||||
UTI_IPToDottedQuad(remote_ip),
|
UTI_IPToDottedQuad(remote_ip),
|
||||||
|
|
28
conf.c
28
conf.c
|
@ -83,6 +83,7 @@ static void parse_cmddeny(const char *);
|
||||||
static void parse_cmdport(const char *);
|
static void parse_cmdport(const char *);
|
||||||
static void parse_rtconutc(const char *);
|
static void parse_rtconutc(const char *);
|
||||||
static void parse_noclientlog(const char *);
|
static void parse_noclientlog(const char *);
|
||||||
|
static void parse_clientloglimit(const char *);
|
||||||
static void parse_logchange(const char *);
|
static void parse_logchange(const char *);
|
||||||
static void parse_mailonchange(const char *);
|
static void parse_mailonchange(const char *);
|
||||||
static void parse_bindaddress(const char *);
|
static void parse_bindaddress(const char *);
|
||||||
|
@ -146,6 +147,9 @@ static double mail_change_threshold = 0.0;
|
||||||
memory */
|
memory */
|
||||||
static int no_client_log = 0;
|
static int no_client_log = 0;
|
||||||
|
|
||||||
|
/* Limit memory allocated for the clients log */
|
||||||
|
static unsigned long client_log_limit = 524288;
|
||||||
|
|
||||||
/* IP address (host order) for binding the NTP socket to. 0 means INADDR_ANY
|
/* IP address (host order) for binding the NTP socket to. 0 means INADDR_ANY
|
||||||
will be used */
|
will be used */
|
||||||
static unsigned long bind_address = 0UL;
|
static unsigned long bind_address = 0UL;
|
||||||
|
@ -200,6 +204,7 @@ static const Command commands[] = {
|
||||||
{"cmdport", 7, parse_cmdport},
|
{"cmdport", 7, parse_cmdport},
|
||||||
{"rtconutc", 8, parse_rtconutc},
|
{"rtconutc", 8, parse_rtconutc},
|
||||||
{"noclientlog", 11, parse_noclientlog},
|
{"noclientlog", 11, parse_noclientlog},
|
||||||
|
{"clientloglimit", 14, parse_clientloglimit},
|
||||||
{"logchange", 9, parse_logchange},
|
{"logchange", 9, parse_logchange},
|
||||||
{"mailonchange", 12, parse_mailonchange},
|
{"mailonchange", 12, parse_mailonchange},
|
||||||
{"bindaddress", 11, parse_bindaddress},
|
{"bindaddress", 11, parse_bindaddress},
|
||||||
|
@ -634,6 +639,21 @@ parse_noclientlog(const char *line)
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
|
||||||
|
static void
|
||||||
|
parse_clientloglimit(const char *line)
|
||||||
|
{
|
||||||
|
if (sscanf(line, "%lu", &client_log_limit) != 1) {
|
||||||
|
LOG(LOGS_WARN, LOGF_Configure, "Could not read clientlog memory limit at line %d", line_number);
|
||||||
|
}
|
||||||
|
|
||||||
|
if (client_log_limit == 0) {
|
||||||
|
/* unlimited */
|
||||||
|
client_log_limit = (unsigned long)-1;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ================================================== */
|
||||||
|
|
||||||
static void
|
static void
|
||||||
parse_logchange(const char *line)
|
parse_logchange(const char *line)
|
||||||
{
|
{
|
||||||
|
@ -1195,6 +1215,14 @@ CNF_GetNoClientLog(void)
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
|
||||||
|
unsigned long
|
||||||
|
CNF_GetClientLogLimit(void)
|
||||||
|
{
|
||||||
|
return client_log_limit;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ================================================== */
|
||||||
|
|
||||||
void
|
void
|
||||||
CNF_GetBindAddress(unsigned long *addr)
|
CNF_GetBindAddress(unsigned long *addr)
|
||||||
{
|
{
|
||||||
|
|
1
conf.h
1
conf.h
|
@ -59,6 +59,7 @@ extern int CNF_GetRTCOnUTC(void);
|
||||||
extern void CNF_GetLogChange(int *enabled, double *threshold);
|
extern void CNF_GetLogChange(int *enabled, double *threshold);
|
||||||
extern void CNF_GetMailOnChange(int *enabled, double *threshold, char **user);
|
extern void CNF_GetMailOnChange(int *enabled, double *threshold, char **user);
|
||||||
extern int CNF_GetNoClientLog(void);
|
extern int CNF_GetNoClientLog(void);
|
||||||
|
extern unsigned long CNF_GetClientLogLimit(void);
|
||||||
extern void CNF_GetBindAddress(unsigned long *addr);
|
extern void CNF_GetBindAddress(unsigned long *addr);
|
||||||
extern void CNF_GetBindCommandAddress(unsigned long *addr);
|
extern void CNF_GetBindCommandAddress(unsigned long *addr);
|
||||||
extern char *CNF_GetPidFile(void);
|
extern char *CNF_GetPidFile(void);
|
||||||
|
|
18
logging.c
18
logging.c
|
@ -40,6 +40,8 @@ static int initialised = 0;
|
||||||
|
|
||||||
static int is_detached = 0;
|
static int is_detached = 0;
|
||||||
|
|
||||||
|
static time_t last_limited = 0;
|
||||||
|
|
||||||
#ifdef WINNT
|
#ifdef WINNT
|
||||||
static FILE *logfile;
|
static FILE *logfile;
|
||||||
#endif
|
#endif
|
||||||
|
@ -214,3 +216,19 @@ LOG_GoDaemon(void)
|
||||||
}
|
}
|
||||||
|
|
||||||
/* ================================================== */
|
/* ================================================== */
|
||||||
|
|
||||||
|
int
|
||||||
|
LOG_RateLimited(void)
|
||||||
|
{
|
||||||
|
time_t now;
|
||||||
|
|
||||||
|
now = time(NULL);
|
||||||
|
|
||||||
|
if (last_limited + 10 > now && last_limited <= now)
|
||||||
|
return 1;
|
||||||
|
|
||||||
|
last_limited = now;
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* ================================================== */
|
||||||
|
|
|
@ -53,6 +53,7 @@ typedef enum {
|
||||||
LOGF_Local,
|
LOGF_Local,
|
||||||
LOGF_Util,
|
LOGF_Util,
|
||||||
LOGF_Main,
|
LOGF_Main,
|
||||||
|
LOGF_ClientLog,
|
||||||
LOGF_Configure,
|
LOGF_Configure,
|
||||||
LOGF_CmdMon,
|
LOGF_CmdMon,
|
||||||
LOGF_Acquire,
|
LOGF_Acquire,
|
||||||
|
@ -84,6 +85,9 @@ extern void LOG_Position(const char *filename, int line_number, const char *func
|
||||||
|
|
||||||
extern void LOG_GoDaemon(void);
|
extern void LOG_GoDaemon(void);
|
||||||
|
|
||||||
|
/* Return zero once per 10 seconds */
|
||||||
|
extern int LOG_RateLimited(void);
|
||||||
|
|
||||||
/* Line logging macro. If the compiler is GNU C, we take advantage of
|
/* Line logging macro. If the compiler is GNU C, we take advantage of
|
||||||
being able to get the function name also. */
|
being able to get the function name also. */
|
||||||
#if defined(__GNUC__)
|
#if defined(__GNUC__)
|
||||||
|
|
|
@ -1358,7 +1358,7 @@ process_known
|
||||||
&inst->local_ntp_tx,
|
&inst->local_ntp_tx,
|
||||||
&inst->remote_addr);
|
&inst->remote_addr);
|
||||||
|
|
||||||
} else {
|
} else if (!LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_NtpCore, "NTP packet received from unauthorised host %s port %d",
|
LOG(LOGS_WARN, LOGF_NtpCore, "NTP packet received from unauthorised host %s port %d",
|
||||||
UTI_IPToDottedQuad(inst->remote_addr.ip_addr),
|
UTI_IPToDottedQuad(inst->remote_addr.ip_addr),
|
||||||
inst->remote_addr.port);
|
inst->remote_addr.port);
|
||||||
|
@ -1526,7 +1526,7 @@ NCR_ProcessNoauthUnknown(NTP_Packet *message, struct timeval *now, NTP_Remote_Ad
|
||||||
remote_addr);
|
remote_addr);
|
||||||
|
|
||||||
}
|
}
|
||||||
} else {
|
} else if (!LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_NtpCore, "NTP packet received from unauthorised host %s port %d",
|
LOG(LOGS_WARN, LOGF_NtpCore, "NTP packet received from unauthorised host %s port %d",
|
||||||
UTI_IPToDottedQuad(remote_addr->ip_addr),
|
UTI_IPToDottedQuad(remote_addr->ip_addr),
|
||||||
remote_addr->port);
|
remote_addr->port);
|
||||||
|
|
6
ntp_io.c
6
ntp_io.c
|
@ -243,7 +243,8 @@ NIO_SendNormalPacket(NTP_Packet *packet, NTP_Remote_Address *remote_addr)
|
||||||
remote.sin_addr.s_addr = htonl(remote_addr->ip_addr);
|
remote.sin_addr.s_addr = htonl(remote_addr->ip_addr);
|
||||||
|
|
||||||
if (sendto(sock_fd, (void *) packet, NTP_NORMAL_PACKET_SIZE, 0,
|
if (sendto(sock_fd, (void *) packet, NTP_NORMAL_PACKET_SIZE, 0,
|
||||||
(struct sockaddr *) &remote, sizeof(remote)) < 0) {
|
(struct sockaddr *) &remote, sizeof(remote)) < 0 &&
|
||||||
|
!LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_NtpIO, "Could not send to %s:%d : %s",
|
LOG(LOGS_WARN, LOGF_NtpIO, "Could not send to %s:%d : %s",
|
||||||
UTI_IPToDottedQuad(remote_addr->ip_addr), remote_addr->port, strerror(errno));
|
UTI_IPToDottedQuad(remote_addr->ip_addr), remote_addr->port, strerror(errno));
|
||||||
}
|
}
|
||||||
|
@ -266,7 +267,8 @@ NIO_SendAuthenticatedPacket(NTP_Packet *packet, NTP_Remote_Address *remote_addr)
|
||||||
remote.sin_addr.s_addr = htonl(remote_addr->ip_addr);
|
remote.sin_addr.s_addr = htonl(remote_addr->ip_addr);
|
||||||
|
|
||||||
if (sendto(sock_fd, (void *) packet, sizeof(NTP_Packet), 0,
|
if (sendto(sock_fd, (void *) packet, sizeof(NTP_Packet), 0,
|
||||||
(struct sockaddr *) &remote, sizeof(remote)) < 0) {
|
(struct sockaddr *) &remote, sizeof(remote)) < 0 &&
|
||||||
|
!LOG_RateLimited()) {
|
||||||
LOG(LOGS_WARN, LOGF_NtpIO, "Could not send to %s:%d : %s",
|
LOG(LOGS_WARN, LOGF_NtpIO, "Could not send to %s:%d : %s",
|
||||||
UTI_IPToDottedQuad(remote_addr->ip_addr), remote_addr->port, strerror(errno));
|
UTI_IPToDottedQuad(remote_addr->ip_addr), remote_addr->port, strerror(errno));
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue