Back To The Future: Security Analysis of the Network Time Protocol and its Implementations

Master Thesis (2025)
Author(s)

S. Konjerla (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Georgios Smaragdakis – Mentor (TU Delft - Cyber Security)

Giovane C. M. Moura – Mentor (TU Delft - Cyber Security)

Fernando Kuipers – Graduation committee member (TU Delft - Networked Systems)

Tamme Bittrich – Mentor (Tweede Golf)

Faculty
Electrical Engineering, Mathematics and Computer Science
More Info
expand_more
Publication Year
2025
Language
English
Graduation Date
25-06-2025
Awarding Institution
Delft University of Technology
Programme
['Computer Science | Cyber Security']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The Network Time Protocol (NTP) is the primary synchronization protocol for billions of devices. Although attacks on NTP servers have been well studied, attacks on NTP clients are less well understood. In this thesis, we scrutinize the 8 NTP clients across 3 Operating systems and test their resilience against attackers and malicious public time servers. We test all the clients against time manipulation, or time-shift attacks and exploit NTP protocol features to induce a denial-of-service for the client by cutting them off from legitimate time servers. We also analyze how these clients perform in normal operations or do they deviate from the NTP-specification-recommended behavior.

Our research analysis unveils 5 bugs and one vulnerabilities, which we disclose to the vendors. While most of the NTP clients follow the associated NTP standards, there exists a wide diversity in the behavior of all the time clients. While many clients follow the specification and best practices, deviations exist which make some of our attacks successful. In detail, macOS time client
is vulnerable to Time Shift attacks, and NTPD-RS is vulnerable to certain Kiss-of-Death packets which causes it to flood the network with queries and OpenNTPd cannot handle the NTP timestamp rollover. We dive into the design and configuration decisions that make the clients vulnerable to different
attacks, we comment of the potential harm, and we propose mitigation.

Files

License info not available
warning

File under embargo until 24-06-2026