Overview of Secure Time Synchronization in NTP
DOI:
https://doi.org/10.54097/4w9c8a78Keywords:
NTP, NTS, Security, Broadcast mode, AuthenticationAbstract
This paper provides an overview of the fundamental principles, historical evolution, and current security challenges of the Network Time Protocol (NTP), along with a detailed exploration of various enhancement methods proposed to address existing vulnerabilities. Initially, the paper analyzes the working mechanisms of NTP and its version progression, highlighting the protocol's critical role in ensuring consistent time synchronization and event ordering within distributed systems. Subsequently, it delves deeply into typical security threats faced by NTP, including packet spoofing, replay attacks, Denial of Service (DoS) attacks, as well as vulnerabilities inherent in the protocol's implementation. Moreover, the paper summarizes multiple security enhancement approaches proposed by researchers globally in recent years, including the Autokey protocol featuring authentication and key exchange mechanisms, authentication models leveraging Elliptic Curve Digital Signature Algorithm (ECDSA) and Secure Sockets Layer (SSL) certificates, the standardized Network Time Security (NTS) protocol, and security enhancement techniques integrating Chinese cryptographic standards and digest authentication mechanisms. Additionally, the paper highlights the shortcomings of existing approaches in practical application scenarios, particularly emphasizing the insufficient security research on the broadcast mode of NTP. It further points out the necessity of systematic design and verification of security strategies related to broadcast mode, aiming to meet synchronization security requirements across broader and more complex network environments.
Downloads
References
[1] D. Mills. RFC 958, Network Time Protocol (NTP) [S]. September, 1985.
[2] D. Mills. RFC 1059, Network Time Protocol (Version 1) Specification and Implementation [S]. July, 1988.
[3] D. Mills. RFC 1119, Network Time Protocol (Version 2) Specification and Implementation [S]. September, 1989.
[4] D. Mills. RFC 1305, Network Time Protocol (Version 3) Specification, Implementation and Analysis [S]. March, 1992.
[5] D. Mills, J. Martin, Ed, et al. RFC 5905, Network Time Protocol Version 4: Protocol and Algorithms Specification [S]. June, 2010.
[6] Dong P, Wei G. Research of security network timing service technique [J]. Journal of Time & Frequency, 2018.
[7] Martin Prpic. MITM attacker can force ntpd to make a step larger than the panic threshold [EB/OL]. https://bugzilla. redhat. com/show_bug. cgi? id=CVE-2015-5300. 2015-10-03
[8] National Vulnerability Database. CVE-2014-9295: Multiple stack-based buffer overflows in ntpd in ntp before 4.2.8 [OL], 2014.
[9] Malhotra A, Goldberg S. Attacking ntp’s authenticated broadcast mode [J]. ACM SIGCOMM Computer Communication Review, 2016, 46(2): 12-17.
[10] Paul Rascagneres. Vulnerability Spotlight: Exploiting Network Time Protocol Origin Timestamp Check Denial of Service Vulnerability [EB/OL]. https://blog.talosintelligence.com/ntpd-dos.
[11] Zao-Xiang D, Xiao-Ning Z, Shu-Jun W, et al. The Vulnerability of NTP Under Forged Server Attack [J]. Electronic Information Warfare Technology, 2016.
[12] Malhotra A, Gundy M V, Varia M, et al. The Security of NTP's Datagram Protocol [C]// Springer, Cham. Springer, Cham, 2017.
[13] Mills D L. The Autokey security architecture, protocol and algorithms [J]. Network Working Group, University of Delaware, Technical Report, 2006: 06-1
[14] Xie T, Feng D. How to find weak input differences for MD5 collision attacks [J]. 2009
[15] Dowling B, Stebila D, Zaverucha G. Authenticated network time synchronization [C]// 25th Security Symposium. 2016: 823-840.
[16] Malhotra A, Van Gundy M, Varia M, et a1. The security of ntp’s datagram protocol [C]. International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017: 405- 423.
[17] Köǧçe M, Şişeci N E. A new approach to security of NTP via SSL certificates [C]//2019 1stInternational Informatics and Software Engineering Conference (UBMYK). IEEE, 2019: 1-5.
[18] Xin L, Yingxin G. Security Analysis and Suggestions on Network Time Synchronization Based on NTP [J]. Modern Transmission, 2019(3):3.
[19] Li L, Youpeng Z. Vulnerability Analysis of Railway Time Synchronization Network Protocol Based on Stochastic Petri Net [J]. Journal of the China Railway Society, 2017.
[20] Franke D, Sibold D, Teichel K, et al. RFC 8915: Network time security for the network time protocol [J]. 2020.
[21] Langer M, Bermbach R, Teichel K, et al. Performance comparison between network time security protocol drafts: Improvements and accuracy of the latest NTS draft [C]//2019 Joint Conference of the IEEE International Frequency Control Symposium and European Frequency and Time Forum (EFTF/IFC). IEEE, 2019: 1-7.
[22] Xi C, Wenchi Z, Ming M. Research on secure NTP method based on message digest encryption [J]. GNSS World of China, 2021, 46(05): 84-91.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Journal of Computer Science and Artificial Intelligence

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.








