Stories
Slash Boxes
Comments

SoylentNews is people

posted by martyb on Thursday October 22 2015, @10:44PM   Printer-friendly
from the does-anyone-really-know-what-time-it-is? dept.

http://arstechnica.com/security/2015/10/new-attacks-on-network-time-protocol-can-defeat-https-and-create-chaos/

Ars Technica reports on a vulnerability where unencrypted Network Time Protocol (NTP) traffic can be exploited by man-in-the-middle attacks to arbitrarily set the times of computers to cause general chaos and/or carry out other attacks, such as exploiting expired HTTPS certificates.

While NTP clients have features to prevent drastic time changes, such as setting the date to ten years in the past, the paper on the attacks presents various methods for bypassing these protections.

There is a pdf of the report available.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by ledow on Friday October 23 2015, @07:24AM

    by ledow (5567) on Friday October 23 2015, @07:24AM (#253522) Homepage

    They still do.

    I work in a school and we've just bought a system from a manufacturer that has an NTP clock on it, and uses a licensed frequency to sync all your clock and bell systems across the site as well. It's used in stock exchanges, etc. to sync everything together, and it doesn't come cheap.

    Although NTP isn't extremely secure, it works the same way as Bitcoin - if you have enough good servers on your list, you will be fine and cancel out the dodgy ones. Using things like the NTP pool is a way to both greatly enhance the number of peers you see, but also to introduce untrusted peers into the mix, and it appears to do quite well thanks. If you don't trust it, there's no reason you can't run a local NTP server - most networks need one if for no other reason that to get the phones in sync with the computers, etc. Just choose a good peer and then have your clients sync from your server and the Internet too. If either local or remote get out of sync, whatever is in the minority will be rejected.

    The most dangerous thing for this would be, for example, time.microsoft.com - an NTP server used and relied on by millions but a single point of failure. I never got why Windows doesn't let you use multiple peers without having to do it manually in the registry. It's just ridiculous.

    However, on most networks, being even 5 minutes out of sync will set off alarm bells. You won't be able to authenticate against your domain, on Windows, and Kerberos tickets will start failing on other systems. So it's not going to happen without you noticing. Sure, it's not a SPECIFIC defence against it, but your clocks getting out of sync isn't going to go unnoticed for very long.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2