10-Jan-03 1
Sir John Tenniel; Alice’s Adventures in Wonderland,Lewis Carroll
Survivable Real-Time Network Services David L. Mills University of - - PowerPoint PPT Presentation
Survivable Real-Time Network Services David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu Sir John Tenniel; Alices Adventures in Wonderland, Lewis Carroll 10-Jan-03 1 Distributed, real-time sensor
10-Jan-03 1
Sir John Tenniel; Alice’s Adventures in Wonderland,Lewis Carroll
10-Jan-03 2
10-Jan-03 3
automatically on most host architectures and operating systems
response to changing network topology and server availability
statistical metric
10-Jan-03 4
destruction, malicious attacks and implementation bugs
protocol
10-Jan-03 5 NTP Messages
principles
implement hybrid phase/frequency-lock feedback loop which determines the system time
Peer 1 Peer 2 Filter 1 Peer 3 Filter 2 Filter 3 Intersection and Clustering Algorithms Combining Algorithm Loop Filter VFO Timestamps P/F-Lock Loop
10-Jan-03 6
distance constraints is NP-hard
persistent state in clients and servers
cryptosystems
10-Jan-03 7
number of servers found
than a fixed minimum number of survivors remain
10-Jan-03 8
first with primary, then with secondary servers at the same stratum
10-Jan-03 9
using X.509 certificates and certificate trails
message digest (keyed MD5), but cryptographically bound do public key
proventic trails
admitted to the population used to synchronize the system clock
10-Jan-03 10
Strat Poll LI Mode VN NTP v3 and v4 Root Delay Root Dispersion Reference Identifier Reference Timestamp (64) Originate Timestamp (64) Receive Timestamp (64) Transmit Timestamp (64) Message Digest (64 or 128) NTP Protocol Header Format (32 bits) LI leap warning indicator VN version number (4) Strat stratum (0-15) Poll poll interval (log2) Prec precision (log2) Seconds (32) Fraction (32) NTP Timestamp Format (64 bits) Value is in seconds and fraction since 0h 1 January 1900 Authenticator uses MD5 cryptosum
Key/Algorithm Identifier Cryptosum Authenticator (Optional) Extension Field 1 (optional) Extension Field 2… (optional) NTP v4 only Prec Extension Field (padded to 32-bit boundary) Field Type Length NTP v4 Extension Field Last field padded to 64-bit boundary authentication only
10-Jan-03 11
Source Address Key ID Dest Address
Cookie Hash NTPv4 Session Key
10-Jan-03 12
Session Key ID List Source Address Next Key ID Dest Address Compute Hash
Final Key ID Final Index Index n Index n + 1 Key ID Cookie Compute Signature Signature
10-Jan-03 13
Session Key ID List NTP Header and Extension Fields Message Authenticator Code (MAC) Key ID Compute Hash
10-Jan-03 14
NTP Header and Extension Fields Message Digest Key ID Compute Hash Message Digest Compare Message Authenticator Code (MAC)
10-Jan-03 15
month
dependent on them
derived from the trusted primary servers at the root of the graph
10-Jan-03 16
timestamp cryptographically bound to trusted time and certificate servers
model and authentication scheme
player has been discovered until receiving its certificate
to topology changes
10-Jan-03 17
www.ntp.org
including replay and clogging
10-Jan-03 18
10-Jan-03 19
http://www.eecis.udel.edu/~mills/status.htm