TY - CONF JO - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual TI - A security analysis of the NTP protocol version 2 T2 - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual IS - SN - VO - SP - 20 EP - 29 AU - Bishop, M. Y1 - 3-7 Dec 1990 PY - 1990 KW - computer networks KW - protocols KW - security of data KW - time measurement KW - Internet KW - NTP protocol version 2 KW - WAN protocol KW - accurate time service KW - large transmission delays KW - masquerade KW - modification KW - network time protocol KW - nontime server KW - replay KW - security analysis KW - security requirements KW - time messages VL - JA - Computer Security Applications Conference, 1990., Proceedings of the Sixth Annual DOI - 10.1109/CSAC.1990.143746 AB - The network time protocol (NTP) is being used throughout the Internet to provide an accurate time service. The author examines the security requirements of such a service, analyzes version 2 of the NTP protocol to determine how well it meets these requirements, and suggests improvements where appropriate. Five types of security attacks on a time service are possible. An attacker could cause a nontime server to impersonate a time server (masquerade), an attacker could modify some (or all) time messages sent by a time server (modification), an attacker could resend a time server's time messages (replay), an attacker could intercept a time server's time messages and delete them (denial of service), and an attacker could delay the time messages by, for example, deliberately flooding the network, thereby introducing large transmission delays (delay) ER -