The network time protocol (NTP) is being used throughout the Internet to provide an accurate time service. The author examines the security requirements of such a service, analyzes version 2 of the NTP protocol to determine how well it meets these requirements, and suggests improvements where appropriate. Five types of security attacks on a time service are possible. An attacker could cause a nontime server to impersonate a time server (masquerade), an attacker could modify some (or all) time messages sent by a time server (modification), an attacker could resend a time server's time messages (replay), an attacker could intercept a time server's time messages and delete them (denial of service), and an attacker could delay the time messages by, for example, deliberately flooding the network, thereby introducing large transmission delays (delay).<<ETX>>
[1]
David L. Mills,et al.
On the Accuracy and Stablility of Clocks Synchronized by the Network Time Protocol in the Internet System
,
1989,
CCRV.
[2]
Alan T. Sherman,et al.
Is the data encryption standard a group
,
1986
.
[3]
John Linn,et al.
Privacy enhancement for Internet electronic mail: Part II - certificate-based key management
,
1987,
Request for Comments.
[4]
Jeffrey I. Schiller,et al.
An Authentication Service for Open Network Systems. In
,
1998
.
[5]
Jon Postel,et al.
User Datagram Protocol
,
1980,
RFC.
[6]
Mike St. Johns.
Draft revised IP security option
,
1988,
RFC.