!!! Overview
[{$pagename}] is the process that attempts to ensure all systems within a [Domain] have the same [Time]

Two primary [Operating System] [{$pagename}] [Services]:
* [Network Time Protocol] ([NTP])
* [Windows Time service]
* [Roughtime]
* [Network Time Security] ([NTS]) 

[{$pagename}] is essential to [Internet] [security] as many security [protocols] and other applications require [{$pagename}] [MCBG] ([RFC 7384]). Unfortunately widely deployed protocols such as the [Network Time Protocol] ([NTP]) ([RFC 5905]) lack essential [Security Considerations], and even newer [protocols] like [Network Time Security] ([NTS]) [I-D.ietf-ntp-using-nts-for-ntp] fail to ensure that the [servers] behave correctly. [Authenticated] time servers prevents network adversaries from modifying time packets. An [authenticated] time server still has full control over the contents of time packet and may go rogue. 

[Roughtime] [protocol] provides [cryptographic proof] of malfeasance, enabling clients to detect and prove to a [Third-party] [server]'s attempts to influence the time a client computes.

%%zebra-table
%%sortable
%%table-filter
||[Protocol]||[Authenticated] Server||Server [Malfeasance] [Evidence]
|[NTP], Chronos|N|N
|[NTP]-[MD5]|Y*|N
|[NTP-Autokey]|Y**|N
|[NTS]|Y|N
|[Roughtime]|Y|Y
/%
/%
/%
[Security] Properties of current protocols
* Y* For security issues with [Symmetric Key] based NTP-MD5 authentication, please refer to [Message Authentication Code] for the [Network Time Protocol] draft
* Y** For security issues with [NTP-Autokey] [Public Key] [Authentication], refer to [NTP-Autokey]

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]

----
* [#1] -  [draft-roughtime-aanchal-00|https://tools.ietf.org/id/draft-roughtime-aanchal-00.html|target='_blank'] - based on information obtained 2019-06-25