DocumentCode
3301469
Title
A security analysis of the NTP protocol version 2
Author
Bishop, Matt
Author_Institution
Dept. of Math. & Comput. Sci., Dartmouth Coll., Hanover, NH, USA
fYear
1990
fDate
3-7 Dec 1990
Firstpage
20
Lastpage
29
Abstract
The network time protocol (NTP) is being used throughout the Internet to provide an accurate time service. The author examines the security requirements of such a service, analyzes version 2 of the NTP protocol to determine how well it meets these requirements, and suggests improvements where appropriate. Five types of security attacks on a time service are possible. An attacker could cause a nontime server to impersonate a time server (masquerade), an attacker could modify some (or all) time messages sent by a time server (modification), an attacker could resend a time server´s time messages (replay), an attacker could intercept a time server´s time messages and delete them (denial of service), and an attacker could delay the time messages by, for example, deliberately flooding the network, thereby introducing large transmission delays (delay)
Keywords
computer networks; protocols; security of data; time measurement; Internet; NTP protocol version 2; WAN protocol; accurate time service; large transmission delays; masquerade; modification; network time protocol; nontime server; replay; security analysis; security requirements; time messages; Access protocols; Clocks; Computer science; Delay effects; Educational institutions; Frequency synchronization; Liver; Mathematics; Network servers; Propagation delay;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual
Conference_Location
Tucson, AZ
Print_ISBN
0-8186-2105-2
Type
conf
DOI
10.1109/CSAC.1990.143746
Filename
143746
Link To Document