[ntp:questions] Re: Fingerprinting hosts by clock skew
mxsmanic at hotmail.com
Thu Mar 10 09:34:24 UTC 2005
Brad Knowles writes:
> It's not necessary. Running NTP with current hardware is enough
> to eliminate the ability to apply active attacks using the mechanisms
> shown. The problem is that passive and semi-active attacks are still
> possible, because the clock skew corrections applied to the system
> clock are not also applied to the TCP/IP clock, and you can still
> measure and fingerprint the TCP clock skew.
But if you applied the corrections directly to the clock hardware, then
anything using the hardware clock would incorporate those corrections,
including TCP/IP clocks ... right?
Transpose hotmail and mxsmanic in my e-mail address to reach me directly.
More information about the questions