 
              Lehrstuhl Netzarchitekturen und Netzdienste Institut für Informatik Technische Universität München Time Synchronization Security Chaudhry Tanmay
Agenda  Time Synchronization Protocols?  Security Concerns  Network Time Protocol  Security • Autokey • Network Time Security  Conclusion 2 TIME SYNCHRONIZATION SECURITY
Time Synchronization Protocols  Purpose : Synchronize computer clocks over a network  Different protocols, but usual operation includes:  'Server' – Has correct time  'Client' – Wants correct time.  Communication between the two entities to synchronize client's clock  Two most widely deployed protocols:  Network Time Protocol  Precision Time Protocol  Security Concerns? 3 TIME SYNCHRONIZATION SECURITY
Network Time Protocol  Most widespread  Accuracy  1ms on LAN  ~10-100ms on public Internet  Architecture – Hierarchical  Multiple levels of 'Servers'  Closer to the Top = More accurate  Higher node serves lower nodes  Peer connections also possible 4 TIME SYNCHRONIZATION SECURITY
NTP – Synchronization Algorithm  Client 'requests' the server for time and calculates two components based on the 'response'  Round Trip Time(δ ) and Offset(θ)  'Offset' is basically difference between the two clocks  Client adjusts it's own clock to minimize 'offset'  All calculation is based on time- stamps of the packets  δ = (t3 - t0) – (t2 – t1)  θ = ((t1 – t0) + (t2 – t3))/2 5 TIME SYNCHRONIZATION SECURITY
Security Concerns  What can happen if a time Attack False Time Degradation synchronization protocol is attacked?  Impacts: Manipulation + -  False Time • Server not authentic, sends Spoofing + - incorrect time on purpose. • Packet manipulated by Delay/ + + attackers during transport. Replay  Degradation of Service • 'Flood' of requests Crypt. - + • Server takes too long to Performance respond. Degraded time Attacks keeping ...  Numerous attacks possible, leading to at least one of the above 6 TIME SYNCHRONIZATION SECURITY
NTP – Security  Consider the two same problems as above:  Fake 'Server': • Sends falsified time-stamps – Protocol Breaks !  Packets Manipulated: • Alter Time-Stamps • Capture and Delay/Replay packets – Protocol Breaks  Security Mechanisms  Autokey  Network Time Security 7 TIME SYNCHRONIZATION SECURITY
Security Requirements  Aim is to prevent 'False Time' and 'Service Degradation'  Security Mechanism must:  Prevent false time – How? • Successfully authenticate 'Server' • Protection against packet manipulation (including delay/replay)  Prevent Degradation of Service – How? • No recurrent computationally intensive tasks!  Most times, balance required between the two. 8 TIME SYNCHRONIZATION SECURITY
Autokey  Available as an Extension to NTP  Major Components:  Message Digests - Packet Integrity  Digital Signatures + Certificates – Identity  Session Key – 'Autokey' to encrypt • Autokey = IPv4 Source Address + Destination Address + KeyId + Cookie – KeyID = Client Specific – Cookie = Random Bits based on Server Seed  In theory, should take care of both server authentication and packet manipulation protection. 9 TIME SYNCHRONIZATION SECURITY
Autokey Vulnerabilities  Server Seed – 32 bits  Request Cookie and brute force the server seed  Similarly, Cookie – 32 bits  Only secret component  Open to Brute Force  Client Authentication based on IP Address  Masquerade/Spoofing breaks this 10 TIME SYNCHRONIZATION SECURITY
Network Time Security  Started out as Autokey v2, aiming to fix it's short comings  Same philosophy with certain differences:  Use X.509 certificates for Identity Authentication  'Cookie' still present but, • Cookie = MSB_128 (HMAC(ServerSeed, H(Certificate Client)) • 128 bits, fixes problem of Brute Force attacks • Includes client certificate, can't request cookie for others by masquerading IP  Also aims to be available for PTP (not yet though) 11 TIME SYNCHRONIZATION SECURITY
NTS – Vulnerabilities  Fixes Autokey's vulnerabilities successfully, but still new. No thorough analysis yet.  Other Issues:  Initial Verification of Certificates  Delay Attacks  Distributed Denial of Service?  Recommendations for these issues as well, but not part of protocol yet. 12 TIME SYNCHRONIZATION SECURITY
NTP Conclusion Autokey Network Time Security Not considered secure So far cryptographically secure. Cryptographically. However no thorough analysis exists. Minimal impact on performance. Uses stronger encryption, but stateless server means it must be repeated, potentially performance degrading. Easy extension to NTP Backward compatible and does not effect operation if not implemented on either side. Only NTP Will be available for PTP as well 13 TIME SYNCHRONIZATION SECURITY
Recommend
More recommend