{"title":"Securing Unprotected NTP Implementations Using an NTS Daemon","authors":"Martin Langer, Thomas Behn, R. Bermbach","doi":"10.1109/ISPCS.2019.8886645","DOIUrl":null,"url":null,"abstract":"This paper presents a method to secure the time synchronization messages of various Network Time Protocol (NTP) services. It uses the Network Time Security protocol (NTS), which is now in a final, pre-RFC state, without the necessity of changes of their underlying implementations. A dedicated NTS service – the so-called NTS daemon (NTSd) – captures the standard NTP messages of the client and passes them on to an NTS server (tunneling). Supplied with the respective timestamps the secured message travels back via the NTS daemon to the NTP client, a procedure completely transparent to the NTP services. The presented research and the implementation of the method show advantages and limitations of the approach. Furthermore, it offers limited correction of NTS related time message asymmetries. Measurements provide an insight into the achievable accuracy and show the differences to NTP services with integrated NTS capability.","PeriodicalId":193584,"journal":{"name":"2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCS.2019.8886645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper presents a method to secure the time synchronization messages of various Network Time Protocol (NTP) services. It uses the Network Time Security protocol (NTS), which is now in a final, pre-RFC state, without the necessity of changes of their underlying implementations. A dedicated NTS service – the so-called NTS daemon (NTSd) – captures the standard NTP messages of the client and passes them on to an NTS server (tunneling). Supplied with the respective timestamps the secured message travels back via the NTS daemon to the NTP client, a procedure completely transparent to the NTP services. The presented research and the implementation of the method show advantages and limitations of the approach. Furthermore, it offers limited correction of NTS related time message asymmetries. Measurements provide an insight into the achievable accuracy and show the differences to NTP services with integrated NTS capability.