{"draft":"draft-ietf-ntp-mac-06","doc_id":"RFC8573","title":"Message Authentication Code for the Network Time Protocol","authors":["A. Malhotra","S. Goldberg"],"format":["ASCII","HTML"],"page_count":"5","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"Network Time Protocols","abstract":"The Network Time Protocol (NTP), as described in RFC 5905, states\r\nthat NTP packets should be authenticated by appending NTP data to a\r\n128-bit key and hashing the result with MD5 to obtain a 128-bit tag.\r\nThis document deprecates MD5-based authentication, which is\r\nconsidered too weak, and recommends the use of AES-CMAC as described\r\nin RFC 4493 as a replacement.","pub_date":"June 2019","keywords":["NTP"],"obsoletes":[],"obsoleted_by":[],"updates":["RFC5905"],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8573","errata_url":null}