I wrote: > http://www.ntp.org/ntpfaq/NTP-s-config-adv.htm > > See section 6.6.2, Authentication
Vincent Lefevre writes: > I don't see how this can work with public NTP servers! If you need authentication you need to use trusted servers. http://www.nist.gov/pml/div688/grp40/auth-ntp.cfm http://www.nist.gov/pml/div688/grp40/upload/-Instructions-for-using-the-NIST-authenticated-Network-Time-Protocol-NTP-server.pdf http://support.ntp.org/bin/view/Servers/WebHome Look through the list for servers that say that they support authentication and follow instructions. > Even without it, though, sucessfully spoofing all four of the servers > you use would be challenging. > I don't see why this would be difficult for someone who controls the > local network (e.g. the wifi hotspot). If your laptop needs precise time and you are a target for such attacks take the time daemon offline when use such unreliable connections. The attacker would not be able to change your clock very fast, though. Unless your laptop needs millisecond accuracy for some reason it's hard to see what such an attack would accomplish. -- John Hasler jhas...@newsguy.com Elmwood, WI USA -- To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: https://lists.debian.org/87oaizhsbm....@thumper.dhh.gt.org