NTP Time Server Security Solutions
The Network Time Protocol (NTP) is developing an Internet protocol to deliver the exact time of a computer network. NTP uses UDP on TCP / IP network to synchronize the reference time of the customer to an exact time. This article describes the security aspects of the NTP protocol, and specifically for the MD5 authentication key with a time server.
The Network Time Protocol is used by many time-critical processes are synchronized to the distributed computers across the network. The NTPProtocol is a potential security risk. Hackers or malicious users could groped, synchronization of the system, while trying to change or replicate disturb NTP timestamp.
Fortunately, NTP has a safety feature integral to thwart attempts to manipulate the synchronization system. NTP MD5 keys can receive encrypted time stamp from a server for authentication. And client devices can use time stamps to authenticate network security key and show the sourceCountry of origin.
NTP implements a client authentication with a selection of cryptographic keys and added with a time stamp agreed set of keys between a server and client are encrypted to an NTP server is a timestamp of the message. If a timestamp is received by the client, the security code is clear and controlled with the list of stored security key. In this way the customer can ensure that the timestamp receivedcomes from the source of the allotted time.
The Network Time Protocol using MD5 (Message Digest 5 encryption) encryption key. MD5 is an encryption algorithm used to secure a 128-bit hash function used. The algorithm is a key fingerprint, provided that the time stamp is attached.
Unix and Linux NTP secure key in a file called "ntp.keys' Every record in the file describes an authentication key of the form." magic number '"Encryption code", "key". The "magic number" is a reference to the button. "Cryptography" describes the encryption algorithm is used, typically 'M' for MD5 encryption. The "key" is the key agreement that is encrypted with the encryption algorithm. A subset of "key of trust can be specified in 'ntp.conf' file to configure NTP. This allows a small subset of keys to be used by the server. Let the keys be compromised easily excluded from consumption. Trusted keys usingthe command "trusted-keys", followed by a space separated list of key references.
Many Cisco routers use MD5 authentication in the secure implementation of NTP installed. To enable a Cisco router to perform MD5 authentication, you must follow a series of steps. First, NTP ntp authenticate authentication enabled "using the command. Second, an authentication key NTP definition identifies with the 'command NTP authentication key. A single referenceNTP each key. The key is the reference number as the first paramater "NTP authentication key" command provided. Third, say you use the "NTP trusted key" command to the router, the keys are valid. The command is the only argument is the key number in the previous paragraph
20002003XP the adoption of a Windows operating system (Simple Network Time Protocol) application SNTP time synchronization. The implementation used by Microsoft does not include authenticationKey.
In essence, some key authentication uses a method to eradicate the possibility of interception of timestamps for malicious purposes. Network Client can now be sure that the reference date and time in fact emerged from the scheduled time and were not intercepted for purposes harmful.
Recommend : MP3 Player HP Pavilion Battery
Danos tu comentario
Post a Comment