Gotta Get Back In Time: New NTP Vulnerabilities and NTPSec

Posted by UpGuard

Gotta Get Back In Time: New NTP Vulnerabilities and NTPSec

The Network Time Protocol (NTP) has been seeing quite a bit of publicity this year, starting with the NTP Leap Second Bug in June promising—but greatly under delivering—digital calamity of Y2K proportions. Ultimately, the fallout resulted in little more than sporadic Twitter interruptions, but last week newly discovered critical vulnerabilities in the timeworn clock synchronization protocol have increased the urgency of recent NTP-hardening projects like NTPSec.

As one of the oldest protocols currently in use, NTP has served as a trusty synchronization mechanism for connected nodes since the dawn of the internet. At the most basic level, the protocol enables the automatic synchronization of local system clocks—a client requests the current time from a server and uses the response to set its own clock. Alternatively, NTP synchronization can work in a peer-to-peer model, but the net result in both cases is the same: synchronization of local time within a few milliseconds of Coordinated Universal Time (UTC).

 UpGuard + IT Security = :)

Despite the passing of three decades since NTP's first implementation, efforts to harden the aged protocol for withstanding today's cyber threats have not kicked into full gear until recently. Which is alarming, considering how critical the element of time is to virtually all internet transactions and system communications. This is about to change, howeverBoston University security researchers published this paper last week describing NTP exploits that could ultimately wreak havoc on the internet, allowing attackers to bypass HTTPS, defeat BitCoin security, alter DNS records, and a host of other nefarious activities. Projects like NTPSec are currently underway to give NTP a security booster shot by simplifying the protocol's codebase and hardening it to withstand today's cyber attacks.

Gotta Get Back In Time: New NTP Vulnerabilities and NTPSec

Attacking various applications with NTP. Source: "Attacking the Network Time Protocol," Boston University.

The project's goal is to make NTP a safer protocol by updating the codebase to meet the security standards of today. NTPSec is essentially a massive NTP cleanup and hardening effort to make the protocol more secure and resilient through community-based testing, contributions, and maintenance. Unfortunately the project has yet to officially released its codebase, so the secure implementation of NTP is still somewhere on the horizon.

So what can be done the interim? Updating NTP clients and servers to the latest version (currently at 4.2.8p4) is the safest bet. Fortunately, UpGuard can scan your whole IT environment for NTP vulnerabilities with a couple mouseclicks. It's free for the first 10 nodes, so give it a test drive on us.

  Schedule an UpGuard demo right now

More Blogs

The "Hacking" Of 000webhost—Or Why Free Should Never Be Synonymous With Unsecure

So how do events like 000webhost's massive data breach involving free web hosting providing 000webhost transpire? In a word, negligence. Gross negligence, to be precise.
Read Blog >

Why We Made Our Vulnerability Assessment Free for Everyone

Access to free vulnerability assessment should be a basic right in a world where computing is integral to social and economic life. For our part, we're offering our full product, including vulnerability assessment, free forever for a user's first ten machines.
Read Blog >

Understanding Risk in the 21st Century

Even today, the risk of data breaches in particular threaten to hamper business innovation. So what is cyber risk, and what can be done about it?
Read Blog >

Source(s):

http://arstechnica.com/security/2015/10/new-attacks-on-network-time-protocol-can-defeat-https-and-create-chaos/

http://esr.ibiblio.org/?p=6881

UpGuard Customers