首页> 外文期刊>Computer communication review >Attacking NTP's Authenticated Broadcast Mode
【24h】

Attacking NTP's Authenticated Broadcast Mode

机译:攻击NTP的身份验证广播模式

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

We identify two attacks on the Network Time Protocol (NTP)'s cryptographically-authenticated broadcast mode. First, we present a replay attack that allows an on-path attacker to indefinitely stick a broadcast client to a specific time. Second, we present a denial-of-service (DoS) attack that allows an off-path attacker to prevent a broadcast client from ever updating its system clock; to do this, the attacker sends the client a single malformed broadcast packet per query interval. Our DoS attack also applies to all other NTP modes that are 'ephemeral' or 'preemptable' (including manycast, pool, etc). We then use network measurements to give evidence that NTP's broadcast and other ephemeral/preemptable modes are being used in the wild. We conclude by discussing why NTP's current implementation of symmetric-key cryptographic authentication does not provide security in broadcast mode, and make some recommendations to improve the current state of affairs.
机译:我们确定了对网络时间协议(NTP)的加密身份验证广播模式的两种攻击。首先,我们提出一种重放攻击,它允许路径上的攻击者将广播客户端无限期地粘贴到特定时间。其次,我们提出了一种拒绝服务(DoS)攻击,它使偏离路径的攻击者可以阻止广播客户端更新其系统时钟。为此,攻击者会在每个查询间隔向客户端发送一个格式错误的广播数据包。我们的DoS攻击还适用于“短暂”或“可抢占”的所有其他NTP模式(包括多播,池等)。然后,我们使用网络测量结果来证明NTP的广播和其他临时/可抢占模式正在野外使用。我们通过讨论为什么NTP当前的对称密钥密码身份验证实现不提供广播模式的安全性来结束,并提出一些建议以改善当前的事务状态。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号