Proceedings 2016 Network and Distributed System Security Symposium 2016
DOI: 10.14722/ndss.2016.23090
|View full text |Cite
|
Sign up to set email alerts
|

Attacking the Network Time Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
51
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 52 publications
(53 citation statements)
references
References 14 publications
0
51
0
1
Order By: Relevance
“…Recently, Malhotra et al [36] showed that attacks on the Network Time Protocol can trick a client system to revert its clock back in time by several years. Such attacks may revive expired certificates with weak RSA keys (easily broken), and weak hashing algorithms (i.e., re-enabling any certificate colliding with a previously-valid certificate, e.g., the colliding CA certificate forged in [60]).…”
Section: ) Invalid Chain Of Trustmentioning
confidence: 99%
“…Recently, Malhotra et al [36] showed that attacks on the Network Time Protocol can trick a client system to revert its clock back in time by several years. Such attacks may revive expired certificates with weak RSA keys (easily broken), and weak hashing algorithms (i.e., re-enabling any certificate colliding with a previously-valid certificate, e.g., the colliding CA certificate forged in [60]).…”
Section: ) Invalid Chain Of Trustmentioning
confidence: 99%
“…Time services such as NTP [95], [96] enable hosts to learn the current time and synchronize their clocks against authoritative sources such as NIST's Internet Time Service [83]. Cryptographic authentication was a late addition to NTP [64] and is still in limited use, leading to many vulnerabilities [86]. For example, an attacker impersonating a legitimate time service might falsify the current time, to trick a client into accepting an expired certificate or other stale credentials.…”
Section: Time and Timestamping Authoritiesmentioning
confidence: 99%
“…Attackers obtaining the secret keys of any of hundreds of CAs [50] can and have misused CA authority to impersonate web sites and spy on users [8], [21], [22], [129]. By impersonating a time service an attacker can trick clients into accepting expired certificates or other stale credentials [86]. Criminals increasingly use stolen codesigning keys to make their malware appear trustworthy [66].…”
Section: Introductionmentioning
confidence: 99%
“…Applications and demand for accurate network time transfer include securities trading [5], distributed databases [6], and realtime cyber-physical systems [7][8][9]. Generally, while information security applications do not yet require UTC at high resolution, they do rely on time accuracy and network integrity [10]. For these reasons, trusted, highly available primary sources of network time like the ITS are vital public resources.…”
Section: Overviewmentioning
confidence: 99%
“…While the message format is unchanged from version 3, the synchronization servo is much improved in later versions. Also, it is likely that security issues [10,36] will be remedied only for current clients. Simple-NTP (SNTP) [14] shares NTP's messaging format but implements fewer features, such as use of the stratum distribution model; popular implementations include sntp and ntpdate [21].…”
Section: Analysis and Findingsmentioning
confidence: 99%