Misuse of a
Network Time Protocol
The Network Time Protocol (NTP) is a networking protocol for clock synchronization between computer systems over packet-switched, variable-Network latency, latency data networks. In operation since before 1985, NTP is one of the oldest Intern ...
(NTP) server ranges from flooding it with traffic (effectively a
DDoS attack) or violating the server's access policy or the NT
rules of engagement One incident was branded ''NTP vandalism'' in an
open letter
An open letter is a Letter (message), letter that is intended to be read by a wide audience, or a letter intended for an individual, but that is nonetheless widely distributed intentionally.
Open letters usually take the form of a letter (mess ...
from
Poul-Henning Kamp to the
router manufacturer
D-Link in 2006. This term has later been extended by others to retroactively include other incidents. There is, however, no evidence that any of these problems are deliberate vandalism. They are more usually caused by shortsighted or poorly chosen default configurations.
deliberate form of NTP server abusecame to note at the end of 2013, when NTP servers were used as part of
amplification denial-of-service attacks. Some NTP servers would respond to a single "monlist" UDP request packet, with packets describing up to 600 associations. By using a request with a
spoofed IP address attackers could direct an amplified stream of packets at a network. This resulted in one of the largest distributed denial-of-service attacks known at the time.
Common NTP client problems
The most troublesome problems have involved NTP server addresses hardcoded in the
firmware
In computing
Computing is any goal-oriented activity requiring, benefiting from, or creating computer, computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both computer hardware, h ...
of consumer networking devices. As major manufacturers and OEMs have produced hundreds of thousands of devices using NTP coupled with customers almost never upgrading the firmware of these devices, NTP query storms problems will persist for as long as the devices are in service.
One particularly common NTP software error is to generate query packets at short (less than five second) intervals until a response is received
* When placed behind aggressive
firewalls that block the server responses, this implementation leads to a never-ending stream of client requests to the variously blocked NTP servers.
* Such over-eager clients (particularly those polling once per second) commonly make up more than 50% of the traffic of public NTP servers, despite being a minuscule fraction of the total clients.
While it might be technically reasonable to send a few initial packets at short intervals, it is essential for the health of any network that client connection re-attempts are generated at logarithmically or exponentially decreasing rates to prevent
denial of service
In computing, a denial-of-service attack (DoS attack) is a cyberattack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host co ...
.
This ''in protocol'' exponential or logarithmic backdown applies to any connectionless protocol, and by extension many portions of connection-based protocols. Examples of this backing down method can be found in the
TCP specification for connection establishment, zero-window probing, and keepalive transmissions.
Notable cases
Tardis and Trinity College, Dublin
In October 2002, one of the earliest known cases of time server misuse resulted in problems for a web server at
Trinity College, Dublin
Trinity College Dublin (), officially titled The College of the Holy and Undivided Trinity of Queen Elizabeth near Dublin, and legally incorporated as Trinity College, the University of Dublin (TCD), is the sole constituent college of the Univ ...
. The traffic was ultimately traced to misbehaving copies of a program called Tardis with thousands of copies around the world contacting the web server and obtaining a timestamp via HTTP. Ultimately, the solution was to modify the web server configuration so as to deliver a customized version of the home page (greatly reduced in size) and to return a bogus time value, which caused most of the clients to choose a different time server.
Netgear and the University of Wisconsin–Madison
The first widely known case of NTP server problems began in May 2003, when
Netgear's hardware products flooded the
University of Wisconsin–Madison
The University of Wisconsin–Madison (University of Wisconsin, Wisconsin, UW, UW–Madison, or simply Madison) is a public land-grant research university in Madison, Wisconsin, United States. It was founded in 1848 when Wisconsin achieved st ...
's
NTP server with requests. University personnel initially assumed this was a malicious
distributed denial of service attack and took actions to block the flood at their network border. Rather than abating (as most DDOS attacks do) the flow increased, reaching 250,000 packets-per-second (150 megabits per second) by June. Subsequent investigation revealed that four models of Netgear routers were the source of the problem. It was found that the SNTP (Simple NTP) client in the routers has two serious flaws. First, it relies on a single NTP server (at the University of Wisconsin–Madison) whose IP address was hard-coded in the firmware. Second, it polls the server at one second intervals until it receives a response. A total of 707,147 products with the faulty client were produced.
Netgear has released firmware updates for the affected products (DG814, HR314, MR814 and RP614) which query Netgear's own servers, poll only once every ten minutes, and give up after five failures. While this update fixes the flaws in the original SNTP client, it does not solve the larger problem. Most consumers will never update their router's firmware, particularly if the device seems to be operating properly.
SMC and CSIRO
Also in 2003, another case forced the NTP servers of the
Australia
Australia, officially the Commonwealth of Australia, is a country comprising mainland Australia, the mainland of the Australia (continent), Australian continent, the island of Tasmania and list of islands of Australia, numerous smaller isl ...
n Commonwealth Scientific and Industrial Research Organisation's (
CSIRO
The Commonwealth Scientific and Industrial Research Organisation (CSIRO) is an Australian Government agency that is responsible for scientific research and its commercial and industrial applications.
CSIRO works with leading organisations arou ...
) National Measurement Laboratory to close to the public. The traffic was shown to come from a bad
NTP implementation in some
SMC router models where the IP address of the CSIRO server was embedded in the firmware. SMC has released firmware updates for the products: the 7004VBR and 7004VWBR models are known to be affected.
D-Link and Poul-Henning Kamp
In 2005
Poul-Henning Kamp, the manager of the only
Danish Stratum 1 NTP server available to the general public, observed a huge rise in traffic and discovered that between 75 and 90% was originating with D-Link's router products. Stratum 1 NTP servers receive their time signal from an accurate external source, such as a GPS receiver, radio clock, or a calibrated atomic clock. By convention, Stratum 1 time servers should only be used by applications requiring extremely precise time measurements, such as scientific applications or Stratum 2 servers with a large number of clients. A home networking router does not meet either of these criteria. In addition, Kamp's server's access policy explicitly limited it to servers directly connected to the
Danish Internet Exchange (DIX). The direct use of this and other Stratum 1 servers by D-Link's routers resulted in a huge rise in traffic, increasing bandwidth costs and server load.
In many countries, official timekeeping services are provided by a government agency (such as
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
in the U.S.). Since there is no Danish equivalent, Kamp provides his time service "''
pro bono publico''". In return, DIX agreed to provide a free connection for his time server under the assumption that the bandwidth involved would be relatively low, given the limited number of servers and potential clients. With the increased traffic caused by the D-Link routers, DIX requested he pay a yearly connection fee of (approximately or ).
Kamp contacted D-Link in November 2005, hoping to get them to fix the problem and compensate him for the time and money he spent tracking down the problem and the bandwidth charges caused by D-Link products. The company denied any problem, accused him of extortion, and offered an amount in compensation which Kamp asserted did not cover his expenses. On 7 April 2006, Kamp posted the story on his website. The story was picked up by
Slashdot,
Reddit
Reddit ( ) is an American Proprietary software, proprietary social news news aggregator, aggregation and Internet forum, forum Social media, social media platform. Registered users (commonly referred to as "redditors") submit content to the ...
and other news sites. After going public, Kamp realized that D-Link routers were directly querying other Stratum 1 time servers, violating the access policies of at least 43 of them in the process. On April 27, 2006, D-Link and Kamp announced that they had "amicably resolved" their dispute.
IT providers and swisstime.ethz.ch
For over 20 years
ETH Zurich
ETH Zurich (; ) is a public university in Zurich, Switzerland. Founded in 1854 with the stated mission to educate engineers and scientists, the university focuses primarily on science, technology, engineering, and mathematics. ETH Zurich ran ...
has provided open access to the time server swisstime.ethz.ch for operational time synchronization. Due to excessive bandwidth usage, averaging upwards of 20 GB / day, it has become necessary to direct external usage to public time server pools, such as ch.
pool.ntp.org. Misuse, caused mostly by IT-providers synchronizing their client infrastructures, has made unusually high demands on network traffic, thereby causing ETH to take effective measures. , the availability of swisstime.ethz.ch has been changed to closed access. , access to the server is blocked entirely for the NTP protocol.
Snapchat on iOS
In December 2016, the operator community NTPPool.org noticed a significant increase in NTP traffic, starting December 13.
Investigation showed that the
Snapchat application running on
iOS was prone to querying ''all'' NTP servers that were hardcoded into a third party iOS NTP library, and that a request to a Snapchat-owned domain followed the NTP request flood.
After Snap Inc. was contacted, their developers resolved the problem within 24 hours after notification with an update to their application. As an apology and to assist in dealing with the load they generated, Snap also contributed timeservers to the Australia and South America NTP pools.
The error-prone default settings were improved after feedback from the NTP community.
Connectivity testing on TP-Link Wi‑Fi extenders
Firmware for
TP-Link Wi‑Fi extenders in 2016 and 2017 hardcoded five NTP servers, including
Fukuoka University in Japan and the Australia and New Zealand NTP server pools, and would repeatedly issue one NTP request and five
DNS requests every five seconds consuming 0.72 GB per month per device.
The excessive requests were misused to power an Internet connectivity check that displayed the device's connectivity status in their web administration interface.
The issue was acknowledged by TP-Link's branch in Japan who pushed the company to redesign the connectivity test and issue firmware updates addressing the issue for affected devices.
The affected devices are unlikely to install the new firmware as WiFi extenders from TP-Link does not install firmware updates automatically, nor do they notify the owner about firmware update availability.
TP-Link firmware update availability also varies by country, even though the issue affects all WiFi range extenders sold globally.
The servers of Fukuoka University are reported as being shut down sometime between February and April 2018, and should be removed from the NTP Public Time Server Lists.
Yandex speaker incident
In the fall of 2024, Yandex introduced a bug in the firmware of their speaker product, causing a massive overload of Russian NTP servers in the NTP pool.
Although Yandex was rolling out the new firmware gradually across their installed base, the full extent of the problem was not detected until 100% of the firmware had been updated.
After the incident was resolved by pushing a hotfix, Yandex announced several measures to prevent similar problems in the future. Among other actions, Yandex donated NTP servers to the pool, improved their monitoring, and indicated they would apply for a vendor zone, which they did not have at the time.
Technical solutions

After the first major incidents, it became clear that apart from stating a server's access policy, a technical means of enforcing a policy was needed. One such mechanism was provided by extending semantics of a ''Reference Identifier field'' in an NTP packet when a ''Stratum field'' is 0.
In January 2006, RFC 4330 was published, updating details of the
SNTP protocol, but also provisionally clarifying and extending the related NTP protocol in some areas. Sections 8 to 11 of RFC 4330 are of particular relevance to this topic (The Kiss-o'-Death Packet, On Being a Good Network Citizen, Best Practices, Security Considerations). Section 8 introduces Kiss-o'-Death packets:
The new requirements of the NTP protocol do not work retroactively, and old clients and implementations of earlier version of the protocol do not recognize KoD and act on it. For the time being there are no good technical means to counteract misuse of NTP servers. Although
chrony
chrony is an implementation of the Network Time Protocol (NTP). It is an alternative to ntpd, a reference implementation of NTP. It runs on Unix-like operating systems (including Linux and macOS) and is released under the GNU General Public Licen ...
supports KoD, it does not produce them in the default rate-limit mode because "few implementations actually support it".
In 2015, due to possible attacks to Network Time Protocol,
a Network Time Security for NTP (
Internet Draft draft-ietf-ntp-using-nts-for-ntp-19
)
was proposed using a
Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network, such as the Internet. The protocol is widely used in applications such as email, instant messaging, and voice over ...
implementation. On June 21, 2019
Cloudflare started a trial service around the world,
based on a previous Internet Draft.
References
{{Reflist, 30em, refs=
[{{ cite IETF , title=Network Time Security for the Network Time Protocol , draft=draft-ietf-ntp-using-nts-for-ntp-18 , publisher=]IETF
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
, date=2019-04-17 , access-date=2019-06-23 , format=html , df = dmy-all , last1=Franke , first1=D. , last2=Sibold , first2=D. , last3=Teichel , first3=K. , last4=Dansarie , first4=M. , last5=Sundblad , first5=R. , url=https://web.archive.org/web/20190615104346/https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-18
[{{ cite IETF , title=Network Time Security for the Network Time Protocol , draft=draft-ietf-ntp-using-nts-for-ntp-19 , date=2019-04-30 , publisher=]IETF
The Internet Engineering Task Force (IETF) is a standards organization for the Internet standard, Internet and is responsible for the technical standards that make up the Internet protocol suite (TCP/IP). It has no formal membership roster ...
, access-date=2019-06-23 , format=html , df = dmy-all , last1=Franke , first1=D. , last2=Sibold , first2=D. , last3=Teichel , first3=K. , last4=Dansarie , first4=M. , last5=Sundblad , first5=R. , url=https://web.archive.org/web/20190613070617/https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-19
[{{Cite web , last1=Malhotra , first1=Aanchal , last2=Cohen , first2=Isaac E. , last3=Brakke , first3=Erik , last4=Goldberg , first4=Sharon , date=2015-10-21 , title=Attacking the Network Time Protocol , url=https://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf , url-status=live , archive-url=https://web.archive.org/web/20190502055717/https://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf , archive-date=2019-05-02 , access-date=2019-06-23 , website=]Boston University
Boston University (BU) is a Private university, private research university in Boston, Massachusetts, United States. BU was founded in 1839 by a group of Boston Methodism, Methodists with its original campus in Newbury (town), Vermont, Newbur ...
, quote=We explore the risk that network attackers canexploit unauthenticated Network Time Protocol (NTP) traffic toalter the time on client systems
[{{Cite web , last=Malhotra , first=Aanchal , date=2019-06-21 , title=Introducing time.cloudflare.com , url=https://blog.cloudflare.com/secure-time/ , archive-url=https://web.archive.org/web/20190621131645/https://blog.cloudflare.com/secure-time/ , archive-date=2019-06-21 , access-date=2019-06-23 , website= Cloudflare Blog , quote=We use our global network to provide an advantage in latency and accuracy. Our 180 locations around the world all use anycast to automatically route your packets to our closest server. All of our servers are synchronized with stratum 1 time service providers, and then offer NTP to the general public, similar to how other public NTP providers function.]
Network time-related software
Denial-of-service attacks