Deep Dive into NTP Pool Popularity and Mapping

Report (2023)
Author(s)

Giovane C. M. Moura (TU Delft - Cyber Security)

Marco Davids (SIDN)

Caspar Schutijser (SIDN)

Cristian Hesselman (SIDN)

John Heidemann (USC Information Sciences Institute)

G. Smaragdakis (TU Delft - Cyber Security)

Research Group
Cyber Security
Copyright
© 2023 Giovane C. M. Moura, Marco Davids, Caspar Schutijser, Cristian Hesselman, John Heidemann, G. Smaragdakis
More Info
expand_more
Publication Year
2023
Language
English
Copyright
© 2023 Giovane C. M. Moura, Marco Davids, Caspar Schutijser, Cristian Hesselman, John Heidemann, G. Smaragdakis
Research Group
Cyber Security
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Time synchronization is crucial on the Internet, and the Network Time Protocol
(NTP) serves as the primary synchronization protocol. The NTP Pool, a
volunteer-driven project introduced 20 years ago, connects clients with NTP servers. Our analysis of Root DNS queries reveals the NTP Pool's widespread use as the most popular time service. Despite its popularity, there has been limited scrutiny of how NTP servers are assigned to clients. In this paper, we investigate the NTP Pool's DNS component (GeoDNS), which maps clients to servers, and find that the current algorithm is overly strict, creating unnecessary risks. We have shared our findings with the NTP Pool operators, who acknowledge them and plan to revise their algorithm to enhance security.