NIST NTP servers

Allan Liska allan at
Tue May 10 14:40:23 UTC 2016

On 5/10/2016 at 10:30 AM, "Chuck Church" <chuckchurch at> wrote:

>It doesn't really.  Granted there are a lot of CVEs coming out for 
>NTP the
>last year or so.  But I just don't think there are that many 
>attacks on it.
>It's just not worth the effort.  Changing time on devices is more 
>annoyance than anything, and doesn't necessarily get you into a 
>Sure you can hide your tracks a little by altering time in logs 
>and altering
>it back, but that's more of an in-depth nation-state kind of 
>attack, not
>going to be a script kiddie kind of thing.  Just follow the best 
>for verifying packet sources and NTP security itself, and you 
>should be ok.

I would argue that the fact the NTP can, and has been, be used in DDoS amplification attacks is a serious concern for using protocol going forward.


More information about the NANOG mailing list