Original Release Date: 6/2/2020
Time synchronization is vital for managing, securing, debugging, and investigating security incidents; accurate timestamps on log files are necessary for alerting and forensic analysis. Additionally, time correlation is necessary for authentication systems, determining network usage, file system updates, diagnosing issues, implementing security rules, and more. Typically, time synchronization is achieved by implementing Network Time Protocol (NTP), which runs on UDP port 123. The NTP network of servers obtains its time from highly accurate atomic clocks or GPS clocks linked to time servers, and distributes this time across systems on a network. NTP is one of the internet’s oldest protocols and is not secure by default, leaving it susceptible to distributed denial-of-service (DDoS) and man-in-the-middle (MitM) attacks. NTP Amplification is a type of reflective DDoS attack in which an attacker targets publicly-accessible NTP servers and repeatedly sends requests to the server using a spoofed IP address in order to send the targeted system a large response from the NTP server. This can lead to a degradation of service due to the high demand on bandwidth, which may prevent legitimate users and systems from reaching and using network resources. For example, an NTP Amplification attack could prevent internet users from reaching an organization's websites and web resources. Additionally, NTP is vulnerable to MitM attacks. These attacks allow unauthorized users to intercept, read, and modify traffic sent between clients and servers. NTP is particularly susceptible to MitM attacks due to the reliance on a small set of servers and the algorithm used to choose a server with which to sync.
The NJCCIC recommends users and administrators implement security measures to reduce the risk of NTP Amplification and MitM attacks by keeping NTP servers up to date, closing port 123 to the internet, disabling the monlist command, implementing ingress filtering, rejecting requests from spoofed IP addresses, implementing firewall rules to restrict access to NTP servers, encrypting traffic to and from clients and servers, and increasing NTP server pools. The NJCCIC also encourages reviewing the NJCCIC post NTP: Time is of the Essence for more information on time synchronization and NTP. Additionally, review the guidance for properly configuring an NTP server for Windows and Linux.