Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Coping with Overload on the Network Time Protocol Public Servers

Published

Author(s)

David Mills, Judah Levine, Richard Schmidt, David Plonka

Abstract

The public time servers operated by USNO and NIST provide time synchronization, directly or indirectly, to millions of Internet computers today. The load in the form of processor cycles and network traffic has doubled in the last two years and could eventually overwhelm the servers and the network infrastructure unless something is done about it. While both USNO and NIST operate multiple servers across the US, the aggregate load is highly unbalanced and the flagship servers at headquarters are nearing capacity. This paper discusses the current conditions at USNO and NIST and suggests technical defenses designed to protect their resources. Surprisingly, a significant fraction of the total load is due to the occasional defective client design that spews an alarming number of packets without good reason. In one incident at the University of Wisonsin a defective NTP implementation in a router product resulted in a large scale denial of service attack on the university's network. At NIST and USNO most of the population are well behaved mice, but a significant proportion of the total traffic is due to a relatively few number of abusive elephants. The paper proposes that the best advice may be to find the elephants and shoot them.
Proceedings Title
Proc. PTTI

Keywords

denial of service attack, flooding attack, network time protocol

Citation

Mills, D. , Levine, J. , Schmidt, R. and Plonka, D. (2004), Coping with Overload on the Network Time Protocol Public Servers, Proc. PTTI , [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=50015 (Accessed May 26, 2024)

Issues

If you have any questions about this publication or are having problems accessing it, please contact reflib@nist.gov.

Created December 7, 2004, Updated January 27, 2020