JNTP Security Authentication and Trusted Time References

,Lebron James Shoes
yright (c) 2008 Richard Williams

NTP (Network Time Protocol) synchronises networks to a single time source using timestamps to represent the current time of the day,Jordan 5 Grape, this is essential for time sensitive transactions and many system applications such as email,Cheap Lebron 10.

NTP is therefore vulnerable to security threats,Coach Factory Outlet Online, whether from a malicious hacker who wants to alter the timestamp to commit fraud or a DDoS attack (Distributed Denial of Service – normally caused by malicious malware that floods a server with traffic) that blocks server access,Lebron 10 Elite.

However,Coach Outlet, being one of the Internet’s oldest protocols and having been developed for over 25 years, NTP is equipped with its own security measures in the form of authentication,Coach Factory Outlet.

Authentication verifies that each timestamp has come from the intended time reference by analysing a set of agreed encryption keys that are sent along with the time information,Grapes 5. NTP, using Message Digest encryption (MD5) to un-encrypt the key,Jordan Grapes 5, analyses it and confirms whether it has come from the trusted time source by verifying it against a set of trusted keys.

Trusted authentication keys are listed in the NTP server configuration file (ntp.conf) and are normally stored in the ntp.keys file. The key file is normally very large but trusted keys tell the NTP server which set of subset of keys is currently active and which are not. Different subsets can be activated without editing the ntp.keys file using the trusted-keys config command.

Authentication is therefore highly important in protecting a NTP server from malicious attack; however there are many time references were authentication can’t be trusted.

Microsoft, who has installed a version of NTP in their operating systems since Windows 2000, strongly recommends that a hardware source is used as a timing reference as Internet sources can’t be authenticated.

NTP is vital in keeping networks synchronised but equally important is keeping systems secure. Whilst network administrators spend thousands in anti-viral/malware software many fail to spot the vulnerability in their time servers.

Many network administrators still entrust Internet sources for their time reference. Whilst many do provide a good source for UTC time (Coordinated Universal Time – the international standard of time), such as

Related articles:

NDon’t Search Blindly Know Where To Look For The Right Colle

USafe Sex Lessons In School Continue To Cause Cont

2Business electricity costs- Combating going to be

iNetwork Camera Video Surveillance for Towns and Cities

EOnline Educations Degree -right Choice For Workin

7Men’S Skin Care, What you need to do

VWhat Happened On June 21

A Lizards Expendable Tail

CBehaviour Assessment

LAn Amazing History of up to The Parachute Regimen

GTeacher’s Gift Ideas

yast,reliable progressed an affordable transportat

CGeneral Considerations When Choosing a multi func

PFatal Aspects Of Monoxide Poisoning

FMany documentconverters offer you the option to

iUnsecured Home Improvement Loans – Boost Your Home Value b

ocomplete IT package

UDigital TV, Cell Phone TV Finally Gets Digital TV… DVB-T That Is

Znew orleans saints to do with professionals for a

zFive New Area Superintendents Appointed To The Sa

8The Best Tips Of Self Help Books

fDuluth Apartments as tall as Settling throughout the,out of

GBeware Of Scholarship Scams as high as Common Sch

Pthrill Between Rental Agents and Hyderab

9five Tips For A Successful Teacher Job Phone Inte

This entry was posted in News and tagged , , . Bookmark the permalink.

Leave a Reply