- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Does RSA Authentication Manager 8.1 SP1 or 8.2 authenticate NTP messages from NTP servers?
NIST control V0014671 states:
Network devices must authenticate all NTP messages received from NTP servers and peers.
Since NTP is used to ensure accurate log file timestamp information, NTP could pose a security risk if a malicious user were able to falsify NTP information. To launch an attack on the NTP infrastructure, a hacker could inject time that would be accepted by NTP clients by spoofing the IP address of a valid NTP server. To mitigate this risk, the time messages must be authenticated by the client before accepting them as a time source.
- Tags:
- 8.1
- 8.2
- AM
- Auth Manager
- Authentication Manager
- Community Thread
- Discussion
- Forum Thread
- ntp
- ntp authentication
- RSA Authentication Manager
- RSA SecurID
- RSA SecurID Access
- SecurID
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No. Technically it can be done but it is not part of the default config
and we do not support making the changes needed.
If you require NTP authentication...
Have some other server you own authenticate NTP to it's upstream peer if you need to,
and then have RSA server peer NTP from it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
No. Technically it can be done but it is not part of the default config
and we do not support making the changes needed.
If you require NTP authentication...
Have some other server you own authenticate NTP to it's upstream peer if you need to,
and then have RSA server peer NTP from it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Has there been any change to this stance by RSA? Support for NTP authentication messages or addition to the roadmap?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I checked the RFE's for NTP authentication...and no official procedures yet at this time.
It remains possible to do by configuring NTP on the Suse 12.3 OS, however, engineering has not written that procedure up. The safe bet today is: Know what you are doing, and configure NTP on the Suse 12.3 command line, and have a backout plan if NTP doesn't operate correctly (undo changes) or, configure your own 'safe' NTP sources and have RSA AM get updates from them.
The existing RFE for this is
AM-33266 RFE: 8.x, 8.4, Provide the ability to use Authenticated NTP in configuration
You can open a support case and ask that your information and needs gets added to this RFE AM-33266.
This way, Product Management sees the added pressure to resolve this internally in the AM code and not have to do it in an unsupported fashion, or set up your own secure NTP environment that AM can sync NTP with.
