Check and set the time by syncing to NTP Servers - not user supplied times if the network 
is available. to see if they have set times > those set by NTP Server 

http://tf.nist.gov/tf-cgi/servers.cgi

The global address time.nist.gov is resolved to all of the server addresses below in a round-robin sequence to equalize the load across all of the servers.


Network Time Protocol (RFC-1305)

The Network Time Protocol (NTP) is the most commonly used Internet time protocol, and the one that provides the best performance. Large computers and workstations often include NTP software with their operating systems. The client software runs continuously as a background task that periodically gets updates from one or more servers. The client software ignores responses from servers that appear to be sending the wrong time, and averages the results from those that appear to be correct.

Many of the available NTP software clients for personal computers don’t do any averaging at all. Instead, they make a single timing request to a signal server (just like a Daytime or Time client) and then use this information to set their computer’s clock. The proper name for this type of client is SNTP (Simple Network Time Protocol).

The NIST servers listen for a NTP request on port 123, and respond by sending a udp/ip data packet in the NTP format. The data packet includes a 64-bit timestamp containing the time in UTC seconds since January 1, 1900 with a resolution of 200 ps.

Most of the NIST time servers do not require any authentication when requesting the time in NTP format, and no keys or passwords are needed to use this service. In addition to this standard NTP service (which will not be modified), we have begun testing an authenticated version of NTP using a single time server that implements the symmetric key encryption method defined in the NTP documentation. In order to use this server, you must apply to NIST for an encryption key, which will be linked to the network address of your system. This service is being offered on an experimental basis only, and it may not be continued after the initial testing period. For more details, please see the authenticated ntp description.

Daytime Protocol (RFC-867)

This protocol is widely used by small computers running MS-DOS and similar operating systems. The server listens on port 13, and responds to requests in either tcp/ip or udp/ip formats. The standard does not specify an exact format for the Daytime Protocol, but requires that the time is sent using standard ASCII characters. NIST chose a time code format similar to the one used by its dial-up Automated Computer Time Service (ACTS), as shown below:

JJJJJ YR-MO-DA HH:MM:SS TT L H msADV UTC(NIST) OTM

where:




On Mon, Aug 20, 2012 at 4:16 PM, <david@lang.hm> wrote:
On Sat, 18 Aug 2012, Michael Richardson wrote:

If we are writing the file system such that time can really never go
backwards, then we are pretty much immune to most replay attacks

If time cannot go backwards, what do you do if someone accidently sets the time in the future?

David Lang

_______________________________________________
Cerowrt-devel mailing list
Cerowrt-devel@lists.bufferbloat.net
https://lists.bufferbloat.net/listinfo/cerowrt-devel



--
P THINK BEFORE PRINTING: is it really necessary?

This e-mail and its attachments are confidential and solely for the
intended addressee(s). Do not share or use them without approval. If received in error, contact the sender
and delete them.