Skip to main content

2016 | Buch

NTP Security

A Quick-Start Guide

insite
SUCHEN

Über dieses Buch

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks in daily deployment. Disruption of NTP services can interrupt communication between servers on the network and take an entire network offline.

Beyond disrupting communication, flaws in the NTP daemon itself can make servers vulnerable to external attack—attacks that often go unnoticed. NTP is being used more frequently in Distributed Denial of Service (DDoS) attacks. It is a User Datagram Protocol (UDP) with encryption schemes that are not often used or are poorly implemented, making it susceptible to spoofing.

Despite all of the security challenges, the fact is that NTP is critical to most modern networks. It is one of those "set it and forget it" protocols that network administrators and even security professionals don't understand in depth. However, an attacker who does understand the security flaws can wreak havoc on an insecure network.

NTP Security: A Quick-Start Guide provides a deeper understanding of the protocol itself and how to deploy a strategy using the protocol throughout a network in a secure manner. Your security team will be able to provide better guidance to the system and network teams who will then be able to better manage the day-to-day implementation.

This succinct resource offers practical guidance to an underserved topic (actually, not served at all). Coverage includes:

An understanding of NTP and the importance of time synchronization in modern networksIssues in NTP security, including an analysis of NTP trafficA review of the vulnerabilities and flaws in the protocolPractical solutions for securing NTP and building a robust infrastructureEffective alternatives to NTP

What you’ll learn

A better understanding of the risks associated with the Network Time protocol (NTP)How to configure NTP on servers and workstations in the network in a more secure manner How to configure NTP on network platforms in a secure manner Ways to bring more NTP capability inside the network, thus creating a smaller attack surface Alternatives to NTP, including how to synchronize network clocks in other ways

Who This Book Is For

System Administrators, Network Engineers, and Security Analysts

Inhaltsverzeichnis

Frontmatter
Chapter 1. Understanding NTP
Abstract
Marking the passage of time has played a role in every great civilization, and as civilizations have continued to evolve, they have also developed a need for more precise timekeeping. The Sumerians, in early Mesopotamia, were content to track the months and years—as early as 3500 BCE—while the Egyptians, a few centuries later, used giant obelisks to track the time during the day. Even within civilizations, the marking of time continued to advance. The Egyptians moved from obelisks to more precise and portable sundials that divided days into 12 parts and were used to track working hours. Shadow clocks allowed Egyptians to track time day and night, and water clocks were used to track time irrespective of the sun.
Allan Liska
Chapter 2. Issues in NTP Security
Abstract
NTP is most likely the longest continuously operating protocol on the Internet. At more than 30 years old, NTP has become pervasive across the Internet, to the point that most people don’t even think about it. Unfortunately, that is part of the problem. NTP is an obscure protocol that rarely fails and does its job well. This has led to a lot of entropy in the development and deployment of the protocol.
Allan Liska
Chapter 3. Vulnerabilities in NTP
Abstract
Having reviewed some of the issues in NTP security, the next step is to take a closer look at some of the vulnerabilities. The goal of this chapter is not to cover specific vulnerabilities, but instead look at how vulnerabilities in NTP can be exploited and the potential damage those exploits can cause to an organization.
Allan Liska
Chapter 4. Securing NTP
Abstract
This chapter gets to the meat of NTP security: actually securing an NTP installation, and protecting an organization from insecure NTP installations. As previously discussed, this is not always as easy as it sounds, especially given the many platforms in an organization’s network that make use of the protocol.
Allan Liska
Chapter 5. Securing NTP Infrastructure
Abstract
NTP security is not just a matter of protecting the infrastructure—it is also requires making sure that infrastructure has a high level of availability. Availability is especially important for those organizations that choose to run their own NTP infrastructure rather than use publicly available NTP servers.
Allan Liska
Chapter 6. Alternatives to NTP
Abstract
Given the number of security problems discussed in this book and that have been discovered and published over the years, it is not surprising that some organizations opt to run alternatives to the NTP reference client. There are a number of different options available.
Allan Liska
Backmatter
Metadaten
Titel
NTP Security
verfasst von
Allan Liska
Copyright-Jahr
2016
Verlag
Apress
Electronic ISBN
978-1-4842-2412-0
Print ISBN
978-1-4842-2411-3
DOI
https://doi.org/10.1007/978-1-4842-2412-0