Presentation by Wyatt Zacharias

Slides:



Advertisements
Similar presentations
Time in Distributed Systems
Advertisements

 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Copyright © 2014 EMC Corporation. All Rights Reserved. Basic Network Configuration for File Upon completion of this module, you should be able to: Configure.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Network Time Protocol (NTP) August 9 th 2011, OSG Site Admin Workshop Jason Zurawski – Internet2 Research Liaison.
OWAMP March 10 th 2011, OSG All Hands Meeting, Network Performance Jason Zurawski – Internet2.
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Distributed Systems Fall 2010 Time and synchronization.
Network Time Protocol - NTP Speaker: Cheng-lin Tsai.
Time Synchronization (RBS, Elson et al.) Presenter: Peter Sibley.
Distributed Systems CS Synchronization – Part II Lecture 8, Sep 28, 2011 Majd F. Sakr, Vinay Kolar, Mohammad Hammoud.
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Network Topologies.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
DYNAMIC HOST CONFIGURATION PROTOCOL (DHCP) BY: SAMHITA KAW IS 373.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks Locations.
Enhanced NTP IETF – TicToc BOF Greg Dowd – Jeremy Bennington –
A Security Analysis of the Network Time Protocol (NTP) Presentation by Tianen Liu.
176 Introduction to Network Time Protocol (NTP) Version A.01 H3065S Module 15 Slides.
NTP Network Time Protocol Nóirín Plunkett Network Time Protocol Nóirín Plunkett.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
Time and Coordination March 13, Time and Coordination What is time? :-)  Issue: How do you coordinate distributed computers if there is no global.
OWAMP August 10 th 2010, OSG Site Admin Workshop - Network Performance Jason Zurawski, Internet2.
Time synchronization for UWSN. Outline Time synchronization knowledge Typical time sync protocol Time sync in UWSN Discussion.
Time This powerpoint presentation has been adapted from: 1) sApr20.ppt.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
COS 420 Day 15. Agenda Finish Individualized Project Presentations on Thrusday Have Grading sheets to me by Friday Group Project Discussion Goals & Timelines.
ITIS 3110 IT INFRASTRUCTURE II Tony Kombol. NTP "Does Anybody Really Know What Time It Is?"*  Time keeping is one of most fundamental aspects of computer.
Computer Network Design EEL 6785 Dr. Janusz Zalewski University of Central Florida.
Introduction to Networking. What is a Network? Discuss in groups.
Distributed Systems Lecture 5 Time and synchronization 1.
ITIS 3110 IT INFRASTRUCTURE II Tony Kombol. NTP "Does Anybody Really Know What Time It Is?"*  Time keeping is one of most fundamental aspects of computer.
Dynamic Host Configuration Protocol
VMware ESX and ESXi Module 3.
Working at a Small-to-Medium Business or ISP – Chapter 6
Networking and Health Information Exchange
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 6: Planning, Configuring, And Troubleshooting WINS.
Distributed Computing
Distributed Systems CS
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
Infrastructure II NTP.
Time and Global States Ali Fanian Isfahan University of Technology
Introducing To Networking
Introduction to Networking
NAT , Device Discovery Chapter 9 , chapter 10.
IS3120 Network Communications Infrastructure
Net 435: Wireless sensor network (WSN)
Nessus Vulnerability Scanning
Client-Server and Peer to Peer networks
Logical time (Lamport)
Distributed Systems CS
Distributed Systems CS
Quad Charts David L. Mills University of Delaware
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Network Hardware and Protocols
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Scalable, High Speed Time Synchronization (D012)
COMPUTER NETWORK TECHNOLOGY
Distributed Systems CS
Distributed Systems CS
Working at a Small-to-Medium Business or ISP – Chapter 6
CDK: Sections 11.1 – 11.4 TVS: Sections 6.1 – 6.2
Connecting to the Network
Logical time (Lamport)
Logical time (Lamport)
What’s the Time? Geoff Huston APNIC.
Logical time (Lamport)
Presentation transcript:

Presentation by Wyatt Zacharias Network Time Protocol Presentation by Wyatt Zacharias Except where otherwise noted this work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/.

History First network time protocol developed in 1979 and demonstrated at the National Computer Conference. Later described in IEN 173 and made into the Internet Clock Service described in RFC 778. Others that came soon after included Time and Daytime protocols, as well as timed. In 1985, NTPv0 is implemented on both UNIX and Fuzzball routers, and described in RFC 958. NTPv1 released in 1988, which includes the client-server and peer-to-peer functionality seen today.

Basic Operation NTP typically runs in a client-server model and will poll multiple servers on diverse networks to achieve synchronization. In order to synchronize its clock to the server, the client must know both the local clock offset from the server, and the round-trip time of network traffic between the client and server. Once the offset and round-trip times are calculated NTP uses statistical analysis to remove outliers and anomalous values.

Round-Trip Calculation NTP can however suffer from inaccuracy when packet travel times are asymmetric because the algorithm assumes that the time from server to client is half that of the round trip time. Offset Calculation  = 𝑡1−𝑡0 +(𝑡2−𝑡3) 2 Round-Trip Calculation δ= 𝑡3−𝑡0 −(𝑡2−𝑡1) Image by Maxiantor (CC0 1.0) - https://en.wikipedia.org/wiki/File:NTP-Algorithm.svg

Clock Strata NTP uses a hierarchical system of time sources, with each level in the hierarchy assigned a number from 0-15. The NTP stratrum number is used to denote a server’s logical distance from a reference clock. Stratrum 0 High precision atomic clocks that generate pulse signals for connected devices. Stratum 1 A server that is directly connected to a Stratum 0 clock, and is accurate to within a couple micro seconds. Stratum 2 A server that is connected to one or more Stratum 1 servers. Typically several stratrum 2 servers will be peered to provide robust time to other hosts on the network. Stratum 3-15 Servers that are logically farther and farther away from a reference clock.

Image Public Domain - http://www. af

Popular Implementations NTPD Produced by The NTP Project, and considered the reference implementation of the protocol Crony Claims to be faster and more accurate than NTPD. Adopted by RedHat as the stock NTP daemon as of RHEL 7. OpenNTPD Developed by the OpenBSD foundation. Focused on security at the expense of speed and accuracy.

Vulnerabilities and Attacks In the last few years a number of vulnerabilities have been found in the NTP daemon, especially vulnerabilities that allow it to be used in DDoS attacks. Versions prior to 4.2.7 released in 2013 were easily exploited for use in DDoS attacks due to bad default configuration. In 2015 it was found that versions prior to 4.2.9 did not properly perform message authentication of data received from a server, allowing a man in the middle to insert bogus time data.

Server Pools As the number of network devices has been growing, each with the need for synchronized network time, the need for reliable public time servers is far beyond any central organizations capacity to provide. The NTP Pool project was launched in 2003, which provides a dynamic list of public NTP servers that have volunteered to provide NTP service to public clients. The current pool contains over 4000 servers providing network time, all of which are periodically verified to provide accurate time.

Demo