SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Network Time Synchronization
By Ben Rothke
CISSP, PCI QSA
Senior Security Consultant
Introduction
Every computer has a variety of clock styles to choose from:               Steven Teppler, Senior Counsel at KamberEdelson, LLC in New
analog, digital or a Big Ben lookalike. For most users, the                York City, notes astutely that not only are there regulatory
accuracy of the basic clock is likely sufficient, even if it is off by a   imperatives to maintaining accurate records, but emerging legal
minute or two.                                                             discovery and evidence management court decisions are
                                                                           beginning to impose severe sanctions and penalties on parties in
For enterprise software applications and related processes, highly         lawsuits who engage in time-based data manipulation. Teppler
accurate and synchronized time is a necessity. An inaccurate               says the implication is that time must be accurate and
computer clock can cause significant problems. A discrepancy of            synchronized to the extent possible within the network, and that
a minute or two could cause a significant and unacceptable                 this accurate and synchronized time must also be reflected in its
margin of error, since many applications require that the time be          association with enterprise computer-generated records in a
kept accurate to the nearest second or less.                               manner also sufficient to withstand a legal challenge.

For example, computers in financial institutions are required to           Perhaps the greatest benefit of effective time synchronization is
keep highly accurate records of when a transaction was                     that it won’t make IT look foolish. The picture of the Boeing 757
completed. Similarly, software used in the manufacturing process           hitting the Pentagon on the morning of September 11, 2001, is
requires mixtures to be executed at a precise time. Internet,              one of the most heartbreaking pictures of the last decade.
radio and TV stations also need computers that can switch feeds            Regrettably, the time stamp on the video was “September 12,
or link up with remote links at the correct time. When the time            2001 5:37PM.” The picture, unfortunately, is used extensively
on enterprise network devices is incorrect, the effects can be             amongst the 9/11 conspiracy community. Having correct time on
costly and significant.                                                    the video monitors would have obviated such misuse.

An accurate time source, as well as time synchronization between           This white paper looks at the need for accurate and synchronized
two devices, is a necessity. However, clocks on computers cannot           enterprise time, what products are available to provide this
be depended on for this source because of their propensity to drift.       capability and how to implement time synchronization.
They use oscillator circuits or a battery-driven, quartz crystal clock
(mainly for cost savings), which can drift up to minutes per day.
With that, serious timing errors can quickly occur.

In addition to inaccurate clocks, an organization needs to defend
its timing infrastructure against malicious attacks from internal and
external attackers. One of the ways an attacker will try to hide their
tracks is by modifying the clock on systems they have breached.




                                                                                                                                           1
Need and Risk                                                          Cost/ROI
Doing things on time is a frequent requirement as many activities      Given the legal, practical and operational realities, adding time
need to be synchronized with others in order to operate at peak        services functionality to your enterprise network is no longer an
levels. But the reality is that synchronized time is a relatively      option. The beauty of implementing a time services infrastructure
new phenomenon, as it was just 125 years ago, on November              to your organization is that it will not break the bank. The
18, 1883, when Standard Time was created. Prior to 1883, local         approximate cost varies between $2,000 and $10,000 depending
mean time was used throughout the USA, which resulted in               on the level of accuracy required, and if redundancy is needed.
plethora of local times. This alone caused chaos to train
schedules, with travelers often missing their trains.                  The time server infrastructure itself initially can be up and
                                                                       running in a day, but will take longer (exactly how long depends
Effective time synchronization can illustrate improprieties.           on the organization and requirements) to fully deploy. Some of
Perhaps the most significant case where time synchronization           its many benefits are:
could have helped–or prevented–fraud is exemplified by Enron.
The CEO and CFO of Enron made a habit of engaging in time-             • Reduced downtime
based data manipulation. CFO Andrew Fastow and his team
altered financial data to suit whatever it was they wanted the         • Prevention of operational failure
investing public or government authorities to know, or not know.       • Avoidance of data loss

Specifically, Fastow backdated documents to manipulate Enron’s         • Improved security
financial statements and, as a result, drained millions of dollars
that rightfully belonged to Enron and a bank that invested with        • Mitigation of legal exposure
Enron. He also backdated documents to overstate value of a             • Time services ROI often measured in weeks or months
technology company in which Enron had invested.
                                                                       Here is a practical example: An attacker illegally infiltrates your
Enron is not an isolated case. Many other companies, including         system on Wednesday, October 29, 2008 between 16:38:39 and
NextCard, Autotote, RiteAid, Parmalot and Adelphia, acted in           17:25:37. Your system logs show that these events occurred
similar ways. And, in all of these cases, effective time               starting at 19:49:12. The attacker has a dozen witnesses stating
synchronization would have provided data integrity assurance of        that he was with them watching the final game of the World
financial reports, grant letters, loan reports, securities             Series from 18:00 to 21:00. Most prosecutors wouldn’t take the
transactions, letters of credit and much more.                         case as the logs can’t be admitted as evidence.

The importance of accurate time and time synchronization
is two-fold:

1. They allow events to occur at the proper time via event
   synchronization. In this way, an organization can schedule a
   process and ensure that it starts or stops on time, or runs for a
   specified period regardless of when it starts or stops. This also
   ensures that cooperating processes can interoperate correctly,
   so that if one process hands a task off to a second process, that
   process will in fact be ready to accept the handoff
2. They provide proof when events occurred or did not occur, in
   other words, using time as a key feature of digital forensics.
If IT does not have synchronized time, it is important to determine
the associated risks. Organizations need to know how accurate
their clocks ought to be–be it minutes, seconds or milliseconds.
Don’t underestimate the risks of inaccurate time; if you don’t
practice due care pertaining to the time on your network and
application, the organization can be legally liable for negligence.




                                                                                                                                          2
Regulatory Imperatives for                                            Network Time Protocol
Time Synchronization                                                  No discussion about time synchronization would be complete
From a regulatory perspective, more and more industry                 without mention of the Network Time Protocol. NTP has been in
standards are requiring time synchronization. Some of these           use for nearly 30 years and remains the longest running,
standards and standards-making bodies are:                            continuously operating, Internet application protocol.

•   21 CFR Part 11                                                    NTP is a User Datagram Protocol (UDP)-based protocol. With
•   Payment Card Industry Data Security Standard (PCI DSS)            UDP, without requiring prior communications, computer
                                                                      applications send messages, known as datagrams, to other hosts
•   GLBA                                                              to set up special transmission channels or data paths. UDP is
•   Sarbanes-Oxley                                                    known as an unreliable protocol, and is used for service and
•   HIPAA                                                             speed, but not for reliability or data integrity.
•   European Telecommunications Standards Institute (ETSI)
                                                                      NTP was designed to synchronize the clock on a client device
•   National Emergency Number Association                             with the clock on a network time server. Note that NTP is simply
•   Public Safety Answering Point Master Clock Standard               the protocol and the use of NTP requires separate client and
•   National Fire Protection Association                              server applications.
•   Standard #1221 - Installation, Maintenance and Use of
    Emergency Services Communication Systems                          NTP is roughly accurate to within 10-100 milliseconds, and even
                                                                      though it uses UDP, which is an unreliable protocol, it has been
One of the most detailed specifications around time                   architected to sustain levels of accuracy and robustness, even
synchronization is the October 2008 update to version 1.2.            when used over numerous gateways and their respective delays.
Section 10.4 of the PCI DSS, which requires an entity to              What NTP specifically does is determine the offset of the client’s
“synchronize all critical system clocks and times.”                   clock relative to the time server’s clock. The client then sends a
                                                                      UPD time request packet to the server, which is time stamped
The PCI testing procedures for requirement 10.4 are to obtain and     and returned. The NTP client computes the local clock offset
review the process for acquiring and distributing the correct time    from the time server and makes an adjustment.
within the organization, as well as the time-related system-
parameter settings for a sample of system components. You should      The use of NTP can be broken up into the following five steps:
verify the following are included in the process and implemented:
                                                                      1. NTP Design - Choose your NTP time source, either Internal
• A known, stable version of NTP (Network Time Protocol) or              (more control, more management) or External (less control,
  similar technology, kept current per PCI DSS Requirements 6.1          less management).
  and 6.2, is used for time synchronization.
                                                                      2. NTP Topology - Issues include the desired level of time
• Internal servers are not all receiving time signals from external      accuracy, number of NTP clients, network infrastructure
  sources. [Two or three central time servers within the                 redundancy and network physical topology and geography.
  organization receive external time signals directly from a             Investigate how the sites are connected as round trip delays
  special radio, GPS satellites or other external sources based on       can impact NTP and negatively affect time accuracy.
  International Atomic Time and UTC (formerly GMT), peer with
  each other to keep accurate time, and share the time with           3. Feature evaluation - Determine which NTP features to use,
  other internal servers.]                                               basic security (authentication, access control) and
                                                                         redundancy (redundancy between peers, redundancy
• Specific external hosts are designated from which the time             configuration on clients).
  servers will accept NTP time updates (to prevent a malicious
  individual from changing the clock). Optionally, those updates      4. Management - How much you need to manage your NTP
  can be encrypted with a symmetric key, and access control              infrastructure is dependent on how important synchronized
  lists can be created that specify the IP addresses of client           time is to your organization.
  machines that will be provided with the NTP service (to             5. Audit - Your time infrastructure must be able to prove that
  prevent unauthorized use of internal time servers).                    the time on any monitored system was correctly
The implications of PCI non-compliance are significant–from fines        synchronized at a particular time and date with a specified
levied by Visa and MasterCard, to having your payment processor          time source. This is often required by industry specific
charge higher fees, to negative publicity and more. Non-compliance       regulations. Note that the audit logs must be used within the
is risky, costly and can quickly bankrupt a merchant.                    context of digital forensics. Your staff needs to know and
                                                                         follow the rules of evidence.


                                                                                                                                         3
NTP Alternative                                                      Time synchronization must be made part of the corporate IT
                                                                     systems and security policies. As an example, the following policy
Some organizations are reluctant to use NTP given the                is quite effective: “Time synchronization to an accurate time
requirement to punch yet another hole in their firewall to allow     source is required on all enterprise network devices.” Without a
NTP port 123 through. The primary concern is that hackers will       policy, there will be no impetus for staff to achieve the goal of
use port 123 as a point of entry to conduct extensive network        accurate, synchronized time.
attacks. An additional concern about opening port 123 is that it
can provide information about the network, as well serve as an
avenue for attack. Some of the information that can be gathered
                                                                     Time Synchronization Products
from port 123 includes:                                              For those companies interested in using a time synchronization
                                                                     appliance, there are a number of vendors offering state-of-the-
•   System uptime                                                    art capabilities. Three leading vendors are:
•   Time since reset
•   Time server packets                                              • Symmetricom www.symmetricom.com
•   I/O, memory statistics                                           • Spectracom www.spectracomcorp.com
•   NTP peer list
                                                                     • EndRun Technologies www.endruntechnologies.com
Also, the attacker can run a replay attack using captured packets,
                                                                     All of these vendors’ products have roughly the same
or can stop security-related chronograph (cron) jobs from running
                                                                     functionality, although each has its own strengths. It is
or cause them to run at incorrect times. For that reason, many
                                                                     important, though, to focus on your specific requirements first,
organizations prefer to use a GPS-based synchronization system.
                                                                     rather than focus on the feature set of each appliance.
GPS satellites have atomic clocks and GPS-based time servers
                                                                     All of the major vendors have stratum 1 NTP/NTP time servers
synchronize with those clocks, which are accurate to
                                                                     that use GPS via oven-stabilized crystal oscillator (OCXO) and
approximately one-millionth of a second to UTC. Since this
                                                                     rubidium oscillators. These maintain time standard if time
occurs behind the corporate firewall, there is no need to open it
                                                                     reference is lost, and also have a dial-out modem that provides
up to another protocol.
                                                                     back up to GPS or functions as the primary reference, such as for
                                                                     disaster recovery, and has accuracy to within a few microseconds
Time Synchronization Checklist                                       over a heavy load.
The following time synchronization checklist is a good way to
                                                                     Don’t forget that you must secure the time appliance itself.
start things rolling:
                                                                     There are many ways in which this can be done. Some of the
                                                                     most effective security features to protect a time server or
System administrators                                                appliance are passwords, SSL and access control lists. Use all of
1. Manually ensure that all firewalls, routers, critical servers,    these for maximum security and protection of the device.
   etc. have the correct time.
2. At this point, synchronizing by calling the United States Naval   Finally, realize that while time synchronization hardware is
   Observatory Master Clock at 202/762-1402 is sufficient.           relatively inexpensive for most organizations, is may be a cost
                                                                     factor in some. Determine how much your organization can
Management                                                           afford to spend.
1. Identify all critical network devices in your organization that
   require accurate time.                                            Conclusion
2. Appoint a responsible technical staff member to be the time       The need for synchronized time is a crucial business and
   services liaison and to manage time services.                     technology requirement. As such, it is an integral part of an
3. Meet with vendors of time synchronization equipment to            effective network and security architecture. Ensuring accurate
   determine the solution that best fits your organization and       time is relatively inexpensive and offers a significant return on
   specific needs.                                                   investment. It is also a great way to be in compliance with your
                                                                     various regulatory efforts and to stop your company from
4. Advise the CIO and CISO on the security risk of non-              getting negative press.
   synchronized time.
5. Get management approval for the purchase of time                  As organizations and IT processes become even more highly
   synchronization equipment.                                        synchronized, the importance of network time synchronization will
                                                                     only increase, and so will the need for accurate, synchronized time.
6. Work with the CIO and CISO to ensure that time
   synchronization is an enterprise policy.


                                                                                                                                         4
About BT
BT is one of the world’s leading providers of communications
solutions and services operating in 170 countries. Its principal
activities include networked IT services, local national and
international telecommunications services and higher-value
broadband and Internet products and services. BT consists
principally of four lines of business: BT Global Services,
Openreach, BT Retail and BT Wholesale.

British Telecommunications (BT) is a wholly owned subsidiary of
BT Group and encompasses virtually all business and assets of
the BT Group. BT Group plc is listed on stock exchanges in
London and New York.

For More Information
Visit http://www.globalservices.bt.com




Offices worldwide
The services described in this publication are subject to availability
and may be modified from time to time. Services and equipment
are provided subject to British Telecommunications plc’s respective
standard conditions of contract. Nothing in this publication forms
any part of any contract.

© British Telecommunications plc 2009

02/17/2009

Mais conteúdo relacionado

Mais procurados

clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System Harshita Ved
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Jubayer Al Mahmud
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K SinhaJawwad Rafiq
 
Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing timeDeepak John
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed systemSunita Sahu
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationJerod Brennen
 
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Kishor Datta Gupta
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systemsguest61205606
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems SHATHAN
 
2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM DeploymentSam Bowne
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical ClocksDilum Bandara
 
Synchronization
SynchronizationSynchronization
SynchronizationSara shall
 
ITMSS March 4th NTP DDoS
ITMSS March 4th NTP DDoSITMSS March 4th NTP DDoS
ITMSS March 4th NTP DDoSTony Anastasio
 

Mais procurados (19)

clock synchronization in Distributed System
clock synchronization in Distributed System clock synchronization in Distributed System
clock synchronization in Distributed System
 
Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking) Operation of Ping - (Computer Networking)
Operation of Ping - (Computer Networking)
 
Synchronization Pradeep K Sinha
Synchronization Pradeep K SinhaSynchronization Pradeep K Sinha
Synchronization Pradeep K Sinha
 
Distributed computing time
Distributed computing timeDistributed computing time
Distributed computing time
 
Seminar
SeminarSeminar
Seminar
 
Synch
SynchSynch
Synch
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Clock synchronization in distributed system
Clock synchronization in distributed systemClock synchronization in distributed system
Clock synchronization in distributed system
 
Pentesting ntp-17-02-18
Pentesting ntp-17-02-18Pentesting ntp-17-02-18
Pentesting ntp-17-02-18
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
Leveraging Machine Learning Approach to Setup Software Defined Network(SDN) C...
 
Communication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed SystemsCommunication And Synchronization In Distributed Systems
Communication And Synchronization In Distributed Systems
 
Synchronization in distributed systems
Synchronization in distributed systems Synchronization in distributed systems
Synchronization in distributed systems
 
Trace route
Trace routeTrace route
Trace route
 
2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment2. Collecting Network Traffic & 3. Standalone NSM Deployment
2. Collecting Network Traffic & 3. Standalone NSM Deployment
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
 
Synchronization
SynchronizationSynchronization
Synchronization
 
Chapter 6 synchronization
Chapter 6 synchronizationChapter 6 synchronization
Chapter 6 synchronization
 
ITMSS March 4th NTP DDoS
ITMSS March 4th NTP DDoSITMSS March 4th NTP DDoS
ITMSS March 4th NTP DDoS
 

Destaque

timing and synchronization
timing and synchronizationtiming and synchronization
timing and synchronizationMuhammad Ahsan
 
Timing synchronization F Ling_v1
Timing synchronization F Ling_v1Timing synchronization F Ling_v1
Timing synchronization F Ling_v1Fuyun Ling
 
Evolution of Network Synchronization Technologies
Evolution of Network Synchronization TechnologiesEvolution of Network Synchronization Technologies
Evolution of Network Synchronization TechnologiesADVA
 
Timing Excellence for Mobile Backhaul Networks at Broadband World Forum
Timing Excellence for Mobile Backhaul Networks at Broadband World ForumTiming Excellence for Mobile Backhaul Networks at Broadband World Forum
Timing Excellence for Mobile Backhaul Networks at Broadband World ForumADVA
 
In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 ADVA
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH networkasifmatin
 
Synchronization and timing loop presentation -mapyourtech
Synchronization and timing loop presentation -mapyourtechSynchronization and timing loop presentation -mapyourtech
Synchronization and timing loop presentation -mapyourtechMapYourTech
 
Chapter8
Chapter8Chapter8
Chapter8wael-b1
 
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014ADVA
 
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...Ben Rothke
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationADVA
 
Symmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricomSYMM
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...LogicMindtech Nologies
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time SynchronizationKrishna Sankar
 
Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsADVA
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase DeliveryADVA
 

Destaque (20)

timing and synchronization
timing and synchronizationtiming and synchronization
timing and synchronization
 
Timing synchronization F Ling_v1
Timing synchronization F Ling_v1Timing synchronization F Ling_v1
Timing synchronization F Ling_v1
 
Evolution of Network Synchronization Technologies
Evolution of Network Synchronization TechnologiesEvolution of Network Synchronization Technologies
Evolution of Network Synchronization Technologies
 
Timing Excellence for Mobile Backhaul Networks at Broadband World Forum
Timing Excellence for Mobile Backhaul Networks at Broadband World ForumTiming Excellence for Mobile Backhaul Networks at Broadband World Forum
Timing Excellence for Mobile Backhaul Networks at Broadband World Forum
 
In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014 In Service Monitoring and Assurance at ITSF 2014
In Service Monitoring and Assurance at ITSF 2014
 
Synchronization in SDH network
Synchronization in SDH networkSynchronization in SDH network
Synchronization in SDH network
 
Synchronisation
SynchronisationSynchronisation
Synchronisation
 
Synchronization and timing loop presentation -mapyourtech
Synchronization and timing loop presentation -mapyourtechSynchronization and timing loop presentation -mapyourtech
Synchronization and timing loop presentation -mapyourtech
 
Chapter8
Chapter8Chapter8
Chapter8
 
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014
Smooth Evolution Path from Legacy to NGN Synchronization at ITSF 2014
 
PACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless StandardsPACE-IT: Introduction to Wireless Standards
PACE-IT: Introduction to Wireless Standards
 
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...The Time Is Now  The Convergence Of Networks, Time Synchronization And Inform...
The Time Is Now The Convergence Of Networks, Time Synchronization And Inform...
 
Chap 5
Chap 5Chap 5
Chap 5
 
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul SynchronizationTelecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
Telecordia NIST/WSTS Workshop: Mobile Backhaul Synchronization
 
Precision clock synchronization_wp
Precision clock synchronization_wpPrecision clock synchronization_wp
Precision clock synchronization_wp
 
Symmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_WebinarSymmetricom Telecom Profile_Webinar
Symmetricom Telecom Profile_Webinar
 
Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...Random broadcast based distributed consensus clock synchronization for mobile...
Random broadcast based distributed consensus clock synchronization for mobile...
 
Precision Time Synchronization
Precision Time SynchronizationPrecision Time Synchronization
Precision Time Synchronization
 
Mobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey ResultsMobile Network Operator Synchronization Survey Results
Mobile Network Operator Synchronization Survey Results
 
Time and Phase Delivery
Time and Phase DeliveryTime and Phase Delivery
Time and Phase Delivery
 

Semelhante a Network Time Synchronization

Time synchronization solution: NTP
Time synchronization solution: NTPTime synchronization solution: NTP
Time synchronization solution: NTPHB TECHNOLOGIES
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben RothkeBen Rothke
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an IntroductoryMNorazizi HM
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperChristian Caracciolo
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?Supreet Oberoi
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxtoltonkendal
 
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET Journal
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtimeBillyHosking
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking SystemGaurav Singh
 
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docx
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docxAppendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docx
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docxarmitageclaire49
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing Loughtec
 
IT Problems & Problem Management
IT Problems & Problem ManagementIT Problems & Problem Management
IT Problems & Problem ManagementApalytics
 
IT Performance Problems
IT Performance Problems IT Performance Problems
IT Performance Problems Apalytics
 
Processing Semantically-Ordered Streams in Financial Services
Processing Semantically-Ordered Streams in Financial ServicesProcessing Semantically-Ordered Streams in Financial Services
Processing Semantically-Ordered Streams in Financial ServicesFlink Forward
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016SteveAtHPE
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
Developing fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDeveloping fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDr Amira Bibo
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhtonmasukmia.com
 

Semelhante a Network Time Synchronization (20)

Time synchronization solution: NTP
Time synchronization solution: NTPTime synchronization solution: NTP
Time synchronization solution: NTP
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben Rothke
 
Computer Audit an Introductory
Computer Audit an IntroductoryComputer Audit an Introductory
Computer Audit an Introductory
 
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - WhitepaperWill You Be Prepared When The Next Disaster Strikes - Whitepaper
Will You Be Prepared When The Next Disaster Strikes - Whitepaper
 
How Does Your Real-time Data Look?
How Does Your Real-time Data Look?How Does Your Real-time Data Look?
How Does Your Real-time Data Look?
 
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docxRunning Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
Running Head NETWORK INFRASTRUCTURE VULNERABILITIES1NETWORK .docx
 
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
IRJET- Effective Technique for Optimizing Timestamp Ordering in Read-Write/Wr...
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Judicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud ComputingJudicial Frameworks and Privacy Issues of Cloud Computing
Judicial Frameworks and Privacy Issues of Cloud Computing
 
Blockchain based Banking System
Blockchain based Banking SystemBlockchain based Banking System
Blockchain based Banking System
 
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docx
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docxAppendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docx
Appendix6ApplicationsFunctionPlatformLocationRockville, MarylandC.docx
 
Loughtec cloud computing
Loughtec cloud computing Loughtec cloud computing
Loughtec cloud computing
 
IT Problems & Problem Management
IT Problems & Problem ManagementIT Problems & Problem Management
IT Problems & Problem Management
 
IT Performance Problems
IT Performance Problems IT Performance Problems
IT Performance Problems
 
Processing Semantically-Ordered Streams in Financial Services
Processing Semantically-Ordered Streams in Financial ServicesProcessing Semantically-Ordered Streams in Financial Services
Processing Semantically-Ordered Streams in Financial Services
 
HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016HPE-Security update talk presented in Vienna to partners on 15th April 2016
HPE-Security update talk presented in Vienna to partners on 15th April 2016
 
Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
Developing fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDeveloping fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systems
 
Machine learning presentation in using pyhton
Machine learning presentation in using pyhtonMachine learning presentation in using pyhton
Machine learning presentation in using pyhton
 

Mais de Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 

Mais de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Último

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Network Time Synchronization

  • 1. Network Time Synchronization By Ben Rothke CISSP, PCI QSA Senior Security Consultant
  • 2. Introduction Every computer has a variety of clock styles to choose from: Steven Teppler, Senior Counsel at KamberEdelson, LLC in New analog, digital or a Big Ben lookalike. For most users, the York City, notes astutely that not only are there regulatory accuracy of the basic clock is likely sufficient, even if it is off by a imperatives to maintaining accurate records, but emerging legal minute or two. discovery and evidence management court decisions are beginning to impose severe sanctions and penalties on parties in For enterprise software applications and related processes, highly lawsuits who engage in time-based data manipulation. Teppler accurate and synchronized time is a necessity. An inaccurate says the implication is that time must be accurate and computer clock can cause significant problems. A discrepancy of synchronized to the extent possible within the network, and that a minute or two could cause a significant and unacceptable this accurate and synchronized time must also be reflected in its margin of error, since many applications require that the time be association with enterprise computer-generated records in a kept accurate to the nearest second or less. manner also sufficient to withstand a legal challenge. For example, computers in financial institutions are required to Perhaps the greatest benefit of effective time synchronization is keep highly accurate records of when a transaction was that it won’t make IT look foolish. The picture of the Boeing 757 completed. Similarly, software used in the manufacturing process hitting the Pentagon on the morning of September 11, 2001, is requires mixtures to be executed at a precise time. Internet, one of the most heartbreaking pictures of the last decade. radio and TV stations also need computers that can switch feeds Regrettably, the time stamp on the video was “September 12, or link up with remote links at the correct time. When the time 2001 5:37PM.” The picture, unfortunately, is used extensively on enterprise network devices is incorrect, the effects can be amongst the 9/11 conspiracy community. Having correct time on costly and significant. the video monitors would have obviated such misuse. An accurate time source, as well as time synchronization between This white paper looks at the need for accurate and synchronized two devices, is a necessity. However, clocks on computers cannot enterprise time, what products are available to provide this be depended on for this source because of their propensity to drift. capability and how to implement time synchronization. They use oscillator circuits or a battery-driven, quartz crystal clock (mainly for cost savings), which can drift up to minutes per day. With that, serious timing errors can quickly occur. In addition to inaccurate clocks, an organization needs to defend its timing infrastructure against malicious attacks from internal and external attackers. One of the ways an attacker will try to hide their tracks is by modifying the clock on systems they have breached. 1
  • 3. Need and Risk Cost/ROI Doing things on time is a frequent requirement as many activities Given the legal, practical and operational realities, adding time need to be synchronized with others in order to operate at peak services functionality to your enterprise network is no longer an levels. But the reality is that synchronized time is a relatively option. The beauty of implementing a time services infrastructure new phenomenon, as it was just 125 years ago, on November to your organization is that it will not break the bank. The 18, 1883, when Standard Time was created. Prior to 1883, local approximate cost varies between $2,000 and $10,000 depending mean time was used throughout the USA, which resulted in on the level of accuracy required, and if redundancy is needed. plethora of local times. This alone caused chaos to train schedules, with travelers often missing their trains. The time server infrastructure itself initially can be up and running in a day, but will take longer (exactly how long depends Effective time synchronization can illustrate improprieties. on the organization and requirements) to fully deploy. Some of Perhaps the most significant case where time synchronization its many benefits are: could have helped–or prevented–fraud is exemplified by Enron. The CEO and CFO of Enron made a habit of engaging in time- • Reduced downtime based data manipulation. CFO Andrew Fastow and his team altered financial data to suit whatever it was they wanted the • Prevention of operational failure investing public or government authorities to know, or not know. • Avoidance of data loss Specifically, Fastow backdated documents to manipulate Enron’s • Improved security financial statements and, as a result, drained millions of dollars that rightfully belonged to Enron and a bank that invested with • Mitigation of legal exposure Enron. He also backdated documents to overstate value of a • Time services ROI often measured in weeks or months technology company in which Enron had invested. Here is a practical example: An attacker illegally infiltrates your Enron is not an isolated case. Many other companies, including system on Wednesday, October 29, 2008 between 16:38:39 and NextCard, Autotote, RiteAid, Parmalot and Adelphia, acted in 17:25:37. Your system logs show that these events occurred similar ways. And, in all of these cases, effective time starting at 19:49:12. The attacker has a dozen witnesses stating synchronization would have provided data integrity assurance of that he was with them watching the final game of the World financial reports, grant letters, loan reports, securities Series from 18:00 to 21:00. Most prosecutors wouldn’t take the transactions, letters of credit and much more. case as the logs can’t be admitted as evidence. The importance of accurate time and time synchronization is two-fold: 1. They allow events to occur at the proper time via event synchronization. In this way, an organization can schedule a process and ensure that it starts or stops on time, or runs for a specified period regardless of when it starts or stops. This also ensures that cooperating processes can interoperate correctly, so that if one process hands a task off to a second process, that process will in fact be ready to accept the handoff 2. They provide proof when events occurred or did not occur, in other words, using time as a key feature of digital forensics. If IT does not have synchronized time, it is important to determine the associated risks. Organizations need to know how accurate their clocks ought to be–be it minutes, seconds or milliseconds. Don’t underestimate the risks of inaccurate time; if you don’t practice due care pertaining to the time on your network and application, the organization can be legally liable for negligence. 2
  • 4. Regulatory Imperatives for Network Time Protocol Time Synchronization No discussion about time synchronization would be complete From a regulatory perspective, more and more industry without mention of the Network Time Protocol. NTP has been in standards are requiring time synchronization. Some of these use for nearly 30 years and remains the longest running, standards and standards-making bodies are: continuously operating, Internet application protocol. • 21 CFR Part 11 NTP is a User Datagram Protocol (UDP)-based protocol. With • Payment Card Industry Data Security Standard (PCI DSS) UDP, without requiring prior communications, computer applications send messages, known as datagrams, to other hosts • GLBA to set up special transmission channels or data paths. UDP is • Sarbanes-Oxley known as an unreliable protocol, and is used for service and • HIPAA speed, but not for reliability or data integrity. • European Telecommunications Standards Institute (ETSI) NTP was designed to synchronize the clock on a client device • National Emergency Number Association with the clock on a network time server. Note that NTP is simply • Public Safety Answering Point Master Clock Standard the protocol and the use of NTP requires separate client and • National Fire Protection Association server applications. • Standard #1221 - Installation, Maintenance and Use of Emergency Services Communication Systems NTP is roughly accurate to within 10-100 milliseconds, and even though it uses UDP, which is an unreliable protocol, it has been One of the most detailed specifications around time architected to sustain levels of accuracy and robustness, even synchronization is the October 2008 update to version 1.2. when used over numerous gateways and their respective delays. Section 10.4 of the PCI DSS, which requires an entity to What NTP specifically does is determine the offset of the client’s “synchronize all critical system clocks and times.” clock relative to the time server’s clock. The client then sends a UPD time request packet to the server, which is time stamped The PCI testing procedures for requirement 10.4 are to obtain and and returned. The NTP client computes the local clock offset review the process for acquiring and distributing the correct time from the time server and makes an adjustment. within the organization, as well as the time-related system- parameter settings for a sample of system components. You should The use of NTP can be broken up into the following five steps: verify the following are included in the process and implemented: 1. NTP Design - Choose your NTP time source, either Internal • A known, stable version of NTP (Network Time Protocol) or (more control, more management) or External (less control, similar technology, kept current per PCI DSS Requirements 6.1 less management). and 6.2, is used for time synchronization. 2. NTP Topology - Issues include the desired level of time • Internal servers are not all receiving time signals from external accuracy, number of NTP clients, network infrastructure sources. [Two or three central time servers within the redundancy and network physical topology and geography. organization receive external time signals directly from a Investigate how the sites are connected as round trip delays special radio, GPS satellites or other external sources based on can impact NTP and negatively affect time accuracy. International Atomic Time and UTC (formerly GMT), peer with each other to keep accurate time, and share the time with 3. Feature evaluation - Determine which NTP features to use, other internal servers.] basic security (authentication, access control) and redundancy (redundancy between peers, redundancy • Specific external hosts are designated from which the time configuration on clients). servers will accept NTP time updates (to prevent a malicious individual from changing the clock). Optionally, those updates 4. Management - How much you need to manage your NTP can be encrypted with a symmetric key, and access control infrastructure is dependent on how important synchronized lists can be created that specify the IP addresses of client time is to your organization. machines that will be provided with the NTP service (to 5. Audit - Your time infrastructure must be able to prove that prevent unauthorized use of internal time servers). the time on any monitored system was correctly The implications of PCI non-compliance are significant–from fines synchronized at a particular time and date with a specified levied by Visa and MasterCard, to having your payment processor time source. This is often required by industry specific charge higher fees, to negative publicity and more. Non-compliance regulations. Note that the audit logs must be used within the is risky, costly and can quickly bankrupt a merchant. context of digital forensics. Your staff needs to know and follow the rules of evidence. 3
  • 5. NTP Alternative Time synchronization must be made part of the corporate IT systems and security policies. As an example, the following policy Some organizations are reluctant to use NTP given the is quite effective: “Time synchronization to an accurate time requirement to punch yet another hole in their firewall to allow source is required on all enterprise network devices.” Without a NTP port 123 through. The primary concern is that hackers will policy, there will be no impetus for staff to achieve the goal of use port 123 as a point of entry to conduct extensive network accurate, synchronized time. attacks. An additional concern about opening port 123 is that it can provide information about the network, as well serve as an avenue for attack. Some of the information that can be gathered Time Synchronization Products from port 123 includes: For those companies interested in using a time synchronization appliance, there are a number of vendors offering state-of-the- • System uptime art capabilities. Three leading vendors are: • Time since reset • Time server packets • Symmetricom www.symmetricom.com • I/O, memory statistics • Spectracom www.spectracomcorp.com • NTP peer list • EndRun Technologies www.endruntechnologies.com Also, the attacker can run a replay attack using captured packets, All of these vendors’ products have roughly the same or can stop security-related chronograph (cron) jobs from running functionality, although each has its own strengths. It is or cause them to run at incorrect times. For that reason, many important, though, to focus on your specific requirements first, organizations prefer to use a GPS-based synchronization system. rather than focus on the feature set of each appliance. GPS satellites have atomic clocks and GPS-based time servers All of the major vendors have stratum 1 NTP/NTP time servers synchronize with those clocks, which are accurate to that use GPS via oven-stabilized crystal oscillator (OCXO) and approximately one-millionth of a second to UTC. Since this rubidium oscillators. These maintain time standard if time occurs behind the corporate firewall, there is no need to open it reference is lost, and also have a dial-out modem that provides up to another protocol. back up to GPS or functions as the primary reference, such as for disaster recovery, and has accuracy to within a few microseconds Time Synchronization Checklist over a heavy load. The following time synchronization checklist is a good way to Don’t forget that you must secure the time appliance itself. start things rolling: There are many ways in which this can be done. Some of the most effective security features to protect a time server or System administrators appliance are passwords, SSL and access control lists. Use all of 1. Manually ensure that all firewalls, routers, critical servers, these for maximum security and protection of the device. etc. have the correct time. 2. At this point, synchronizing by calling the United States Naval Finally, realize that while time synchronization hardware is Observatory Master Clock at 202/762-1402 is sufficient. relatively inexpensive for most organizations, is may be a cost factor in some. Determine how much your organization can Management afford to spend. 1. Identify all critical network devices in your organization that require accurate time. Conclusion 2. Appoint a responsible technical staff member to be the time The need for synchronized time is a crucial business and services liaison and to manage time services. technology requirement. As such, it is an integral part of an 3. Meet with vendors of time synchronization equipment to effective network and security architecture. Ensuring accurate determine the solution that best fits your organization and time is relatively inexpensive and offers a significant return on specific needs. investment. It is also a great way to be in compliance with your various regulatory efforts and to stop your company from 4. Advise the CIO and CISO on the security risk of non- getting negative press. synchronized time. 5. Get management approval for the purchase of time As organizations and IT processes become even more highly synchronization equipment. synchronized, the importance of network time synchronization will only increase, and so will the need for accurate, synchronized time. 6. Work with the CIO and CISO to ensure that time synchronization is an enterprise policy. 4
  • 6. About BT BT is one of the world’s leading providers of communications solutions and services operating in 170 countries. Its principal activities include networked IT services, local national and international telecommunications services and higher-value broadband and Internet products and services. BT consists principally of four lines of business: BT Global Services, Openreach, BT Retail and BT Wholesale. British Telecommunications (BT) is a wholly owned subsidiary of BT Group and encompasses virtually all business and assets of the BT Group. BT Group plc is listed on stock exchanges in London and New York. For More Information Visit http://www.globalservices.bt.com Offices worldwide The services described in this publication are subject to availability and may be modified from time to time. Services and equipment are provided subject to British Telecommunications plc’s respective standard conditions of contract. Nothing in this publication forms any part of any contract. © British Telecommunications plc 2009 02/17/2009