海角大神

Modern field guide to security and privacy

Researchers reveal how attackers could turn back Internet time

Boston University researchers discovered vulnerabilities in the ubiquitous computing protocol that keeps time synched across networks, opening up critical operations such as air traffic control to attacks.

|
Brian Snyder/Reuters

Boston University researchers discovered multiple vulnerabilities in Network Time Protocol (NTP), one of the oldest and most important standards on the Internet.

Introduced 30 years ago, NTP ensures times are synchronized across networks 鈥 a key component of business transactions, encryption, and even logging in or out of websites. Attacks over the protocol could throw off industrial computers that need to coordinate systems including air traffic control, prevent financial transactions from being properly recorded, or sidestep commonly used forms of Internet security.

"We were surprised no one noticed these before," said Sharon Goldberg, an associate professor at Boston University who, alongside听graduate student Aanchal Malhotra and undergraduate Isaac Cohen, discovered the three NTP vulnerabilities.听The paper, released Wednesday, is available .

NTP is so ubiquitous that most people who use computers rely on听it without realizing it. It's important because Web browsers such as Safari or Chrome rely on a听system of certificates to verify that a website claiming to be Amazon.com, for instance, is actually Amazon.com. If those certificates are compromised, they can be revoked 鈥 but only until the certificate expires. Turning back the clock on users' computer is effectively a way to convince computers that an expired 鈥 and possibly compromised 鈥 certificate is still valid.

The most problematic NTP vulnerability affects a safety feature known as "the kiss-o鈥-death packet"(KOD), introduced nearly a decade ago. The KOD is a server鈥檚 self-defense mechanism against computers that request the time more often than a predetermined rate, either as a malicious attempt to clog traffic or during a malfunction. The packet听tells a computer to stop requesting the time for a certain waiting period, which is designed to be set between two seconds and around 36 hours 鈥 although the Boston University team found that waiting period could be set much higher without the computer checking.听

But the NTP system does not do a good job verifying what system sent the KOD packet. And, since the attack only requires a small amount of data to be sent, an attacker could relatively quickly scan and disable entire networks of computers鈥 access to any or all NTP servers.

"When you look at the conversations from when the kiss-o鈥-death was being developed," Goldberg said, "developers were mostly worried about whether or not anyone would bother to listen to the kiss-o鈥-death packet 鈥 people weren鈥檛 sure if someone intentionally abusing an NTP server would stop if a server asked it to. They were not worried about security."

The Boston University team worked with a number of groups to develop patches for the KOD error, including the Network Time Foundation (which hosts the main template for NTP), and companies like Cisco, NTPsec, and RedHat, which use NTP in their products. Those patches are now available through the software manufacturers using NTP.

The KOD attack is especially dangerous, because it does not require much听technical skill or equipment to pull off, says Goldberg. But the Boston University team also identified two other attacks which sophisticated attackers could use to change the time on victims鈥 computers.听

Computers can usually weed out NTP times that are clearly fake because they have internal clocks that are not perfectly accurate, but don鈥檛 go too far awry. NTP is designed with a safety valve to prevent a clock from being reset more than 15 minutes beyond what time it thinks it is. But when computers boot up, most operating systems turn off that safety valve. That makes some sense 鈥 computers are often off for extended periods of time, and are often more than 15 minutes out of whack. In that instance, the Boston University team found that they could reset the time however they pleased.

This is not the first time vulnerabilities have been reported in NTP 鈥 a problem found a year ago lead to the first automatic update in Apple鈥檚 history 鈥 but for a 30-year-old protocol it is generally considered secure.听

"To say it鈥檚 never going to have an issue is wrong," said听Eric Dube, a principal product manager at Red Hat who works with NTP. "But all protocols are vulnerable to some degree. This one is pretty robust. And the NTP community is extremely good about taking problems seriously and getting them patched."

Correction: The original version of this article used the incorrect name for the Network Time Foundation. It has been changed.听

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
海角大神 was founded in 1908 to lift the standard of journalism and uplift humanity. We aim to 鈥渟peak the truth in love.鈥 Our goal is not to tell you what to think, but to give you the essential knowledge and understanding to come to your own intelligent conclusions. Join us in this mission by subscribing.
QR Code to Researchers reveal how attackers could turn back Internet time
Read this article in
/World/Passcode/2015/1021/Researchers-reveal-how-attackers-could-turn-back-Internet-time
QR Code to Subscription page
Start your subscription today
/subscribe