NTP security : a quick-start guide / Allan Liska.
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks in daily deployment. Disruption of NTP services can interrupt communication between servers on the network and take an entire network offline. Beyond disrupting communication, flaws in the NTP daemon...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Main Author: | |
Format: | eBook |
Language: | English |
Published: |
[United States] :
Apress,
2016.
|
Subjects: |
Table of Contents:
- About the Author; About the Technical Reviewer; Acknowledgments; Introduction; Chapter 1: Understanding NTP; A Brief History of Time Synchronization; The Importance of Time Synchronization in Modern Networks; The Network Time Protocol; Understanding NTP; NTP from the Client Side; NTP Server Configuration; NTP Reference Implementation; NTP Authentication; Mapping the Network Time Protocol; Conclusions; Chapter 2: Issues in NTP Security; A History of NTP Attacks; Why Is NTP So Insecure?; The Problem with "Set It and Forget It" Protocols; Analysis of NTP Traffic; Conclusions.
- Chapter 3: Vulnerabilities in NTPVulnerabilities in the Daemon; Vulnerabilities in the Protocol; Flaws in NTP Encryption and Authentication; Symmetric Encryption; AutoKey; NTP Use in DDoS Attacks; Conclusions; Chapter 4: Securing NTP; Collecting NTP Information; Hardening an NTP Installation; Running NTP in a Chroot Jail; Run NTP As an Unprivileged User; Protecting NTP Communication; Securing the ntp.conf File; Secure Configurations on Juniper and Cisco; Monitoring NTP Traffic; Alerting on NTP Security Issues; Correlating Alerts; Conclusions; Chapter 5: Securing NTP Infrastructure; BCP38.
- Broadcast AttacksImplementing BCP38; NTP Pooling; NTP Over Multicast/Manycast; Multicast; Manycast; Conclusions; Chapter 6: Alternatives to NTP; NTPSec; Ntimed; tlsdate; Precision Time Protocol (PTP); Conclusions; Index.