UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The NTP server is not configured with a symmetric key that is unique from any key configured on any other NTP server.


Overview

Finding ID Version Rule ID IA Controls Severity
V-17852 NET0819 SV-19127r1_rule ECSC-1 Low
Description
NTP provides an efficient and scalable method for managed network elements to actively synchronize to an accurate time source. Insuring that there are always NTP servers available to provide time is critical. It is imperative that all single points of failure for the NTP infrastructure are eliminated. Knowing the correct time is not only crucial for proper network functioning but also for security. Compromising an NTP server opens the door to more sophisticated attacks that include NTP poisoning, replay attacks, and denial of service.
STIG Date
Network Devices Security Technical Implementation Guide 2013-10-08

Details

Check Text ( C-19353r1_chk )
Interview the IAO and administrator to determine if unique keys have been configured.
Fix Text (F-17789r1_fix)
If a hashing algorithm is being used, all servers must be configured with a symmetric key that is unique from any key configured on any other NTP server.