So how's this different from specifying multiple servers for the normal NTP client? When I do that and one server is out of whack compared to the others, you know what? The NTP client rejects the dodgy server as a time source.
Boffins want to stop Network Time Protocol's time-travelling exploits
Among the many problems that exist in the venerable Network Time Protocol is its vulnerability to timing attacks: turning servers into time-travellers can play all kinds of havoc with important systems. Complicating the problem is that timing attacks are enabled by the protocol itself, which makes it hard to change. Now a …
COMMENTS
-
-
Monday 2nd July 2018 06:13 GMT Richard 12
Numbers
You don't want to just reject one.
Say you query three servers and your system is set up to reject a single outlier.
If the attacker can affect two of the servers, your system will reject the good one!
If you query ten and reject the outliers, an attacker has to delay 6 of them to succeed.
-
Monday 2nd July 2018 09:31 GMT Mark in CA
It's totally different. Specifying multiple servers today means you are still relying on the result from only one server. What is being suggested here is always relying on the result of tens of servers, or more. This is not unlike how scientists today determine what "real" time is, by querying all the atomic clocks in their netowrk of such devices around the world, tossing out outiers and then performing a weighted average.
-
-
Monday 2nd July 2018 07:56 GMT hammarbtyp
Time NTP was upgraded(See what I did there!)
To be honest its about time NTP was replaced with something a bit more fit for purpose. Every month we have a issue with NTP due to mis-configuration or lack of understanding
Any new algorithm should include a modern security infrastructure using certificates to verify time sources, provide greater accuracy in LAN environments by piggy backing on IEEE 1558, more control on the skewing, improved configuration tool and better monitoring interfaces.
-
-
Monday 2nd July 2018 09:07 GMT hammarbtyp
Re: Time NTP was upgraded(See what I did there!)
All that infrastructure defeats the whole purpose of NTP: a lightweight protocol.
We have SNTP for that
Add a certificate, and handling it becomes a bottleneck that injects a whole new timing attack vector, quite apart from causing packets to timeout.
Not necessarily. If the NTP next gen was modular and scalable you could target it to whatever device you wanted. Anyone who has had to wade through the standard NTP code base will tell you that it is huge mess of spagettified code which needs a rethink and rewrite.
Security wasn't a big thing when NTP was invented, but now is the primary concern. if you are required to get information off-site, you need to have trust, this requires encryption, PKI, etc. You can do this with a VPN if necessary, but the overhead is much the same.
If you want you can use your edge devices to get the NTP signal and then relay it to other devices using a lower overhead protocol/transport mechanism. It would just be nice if NTP supported all the various use cases
-
Monday 2nd July 2018 09:27 GMT Paul Crawford
Re: Time NTP was upgraded(See what I did there!)
Lets face it - if your really REALLY depend on time to < 100ms or so accuracy (which seems to be the thing here - as I think trying to delay the NTP out/return by much more than that will lead to rejection anyway) you should get your own GPS receiver to have your own stratum-1 source.
Sure it is a cost but you can start from £100 (for a Raspberry PI and a GPS expansion board (e.g. from uptronics), antenna, plus a funky case) or get 1U servers for around the £1-3k mark depending on hold-over accuracy and battery back up features.
And you are doing what that needs super-accurate time? It is not a consumer problem as typically Windows machines are out be much more due to SMTP and (last I checked) ~1 week polling so if you are looking at fraud in the £M region from 100ms of fiddling why are you trusting it all through a single ISP, etc?
-
Monday 2nd July 2018 10:22 GMT david 12
Re: Time NTP was upgraded(See what I did there!)
I don't think that <0.1s time is a really demanding standard. The real issue is with people who depend on time, but don't have a place for GPS receiver. Which is small security system devices. The <0.1sec statement is just an indication that their system works well enough to be useful.
-
Monday 2nd July 2018 10:42 GMT Anonymous Coward
Re: Time NTP was upgraded(See what I did there!)
GPS receivers are only one of many potential reliable time sources - and probably the newest. There's plenty of radio clocks (much easier to fit than GPS clocks IME, many countries have at least one tower somewhere broadcasting a time signal of some description - https://en.wikipedia.org/wiki/Radio_clock#List_of_radio_time_signal_stations), you can buy a nice rubidium clock (or if you're really flush you can get a caesium clock with a rubidium backup), you can get a direct connection to an atomic clock at the National Physical Laboratory if you really want to.
-
Monday 2nd July 2018 11:59 GMT Anonymous Coward
Re: Time NTP was upgraded(See what I did there!)
And how reliable are GPS and radio clocks? I seem to remember reading a detailed description once of the signal used by radio clocks and seeing no mention of cryptographic authentication, so that would presumably be easy to fake. I don't know about GPS. Can anyone tell us?
Another thing about GPS: it doesn't use UTC, does it? So you'd have to, firstly, make sure your systems don't fail when there's a genuine leap second, and, secondly, make sure an adversary doesn't feed you bogus information about leap seconds.
The next version of NTP should make it easier to get TAI and UTC in a straightforward way from the same server, rather than have to work one out from the other using a document taken from a different server. The clock_gettime system call on Linux lets you ask for TAI and UTC, but very few systems seem to be set up so that this works properly. (Go on, try it!)
-
This post has been deleted by its author
-
Monday 2nd July 2018 13:10 GMT Paul Crawford
Re: Time NTP was upgraded(See what I did there!)
"And how reliable are GPS and radio clocks?"
Generally pretty good, but not totally spoof-proof which is why you normally have more than one receiver (for hardware redundancy) on site and also use a decent number of NTP servers for confirmation as well. I think Meinberg offer servers with both LW and GPS sources for added certainty.
"Another thing about GPS: it doesn't use UTC, does it?"
No, GPS internally uses an atomic time scale that was in-sync with UTC in 1980 as well as providing the stepped UTC-GPS offset to get UTC today. Any decent GPS module also provides the pending leap second information as well, but sadly these days quite a lot of cheap GPS modules only use NMEA strings to communicate and they don't report leap second information. Also the companies behind them seem to be populated by muppets that don't understand the products or service they are selling.
-
Monday 2nd July 2018 15:49 GMT Anonymous Coward
Re: Time NTP was upgraded(See what I did there!)
AC asked, "how reliable [secure] are....radio clocks?"
Not even slightly. There's trivial Arduino code floating around to create legacy baseband time code waveform as used by WWVB. As you surmised, it's plain text.
Transmitting it at 60 kHz RF is equally trivial. So it's an easy prank to reset all your neighborhood radio clocks to whatever comedy time you like.
There's another more recent phase shift waveform layered on top. That'd be another stage to your prank. A few more days effort.
-
Monday 2nd July 2018 16:03 GMT Paul Crawford
Re: Time NTP was upgraded(See what I did there!)
"Transmitting it at 60 kHz RF is equally trivial."
At close range, yes. But not from far away as it takes a pretty big antenna to get any sort of radiating efficiency at 60kHz.
It all comes down to your risk assessment, while anyone on the other side of the world can poke at your systems via the Internet, getting up close and personal to fiddle radio clocks carries a higher cost and risk of being caught. Having a combination of sources allows you to pick out dodgy clocks (the "false tickers" in NTP parlance) and more than one radio type adds another layer.
But if you do see yourself at risk of a serious, planned and coordinated timing attack and it is of value you can get your own atomic clocks ("low cost" are Rb + GPS adjustment, or if you really must have the bast a few companies make hydrogen masers).
-
Wednesday 4th July 2018 19:08 GMT Bill Stewart
Re: Time NTP was upgraded(See what I did there!)
Hah - I should try that, not for nefarious reasons, but because I've got a WWVB clock that has trouble getting signal in my house unless I stick it in an upper window. (At the moment, this means retrieving it from behind a dresser, because the cat also likes that window and knocked the clock off the windowsill.)
-
-
-
-
-
Monday 2nd July 2018 10:32 GMT Peter Gathercole
Re: Time NTP was upgraded(See what I did there!)
Unfortunately, things like Blockchain, and a lot of historical trading and other financial systems absolutely need reliable sub-second accuracy in order to record the absolute time of transactions to make sure that a successful sequence is recorded. It is here that, for example, making a transaction look like it happened later (or earlier!) than it actually did could invalidate the transaction (think if someone were able to delay your registration of a newly mined bitcoin, and claim it as their own merely because they could subvert the time your system apparently mined it).
I worked in the electricity distribution industry some time back, and they had a requirement for accurate sub-second time as well, not that I ever asked why ( the fact that I was compiling the xntpd source to include the RCC8000 time clock tells you how long ago that was).
-
Monday 2nd July 2018 15:35 GMT Brian Miller
Re: Time NTP was upgraded(See what I did there!)
Unfortunately, things like Blockchain, and a lot of historical trading and other financial systems absolutely need reliable sub-second accuracy in order to record the absolute time of transactions to make sure that a successful sequence is recorded.
True, and PTP (IEEE 1588-2002) is designed for high-accuracy synchronization.
I've had the "fun" of setting up configurations of NTP clusters, and making sure they were actually staying accurate. NTP can, and will, go wonky when the configuration isn't right. I've seen a cluster, with uplink, go out of sync over the weekend, and the cluster's time was a week ahead of where it should have been. Yes, the cluster's time was in sync with itself, but not with its master.
-
Monday 2nd July 2018 16:13 GMT Loyal Commenter
Re: Time NTP was upgraded(See what I did there!)
think if someone were able to delay your registration of a newly mined bitcoin, and claim it as their own merely because they could subvert the time your system apparently mined it
From my understanding of this, that person would have to get in between your 'mining' the coin and everyone else on the blockchain network hearing about it, and also 'mine' that coin themselves.
In practice, this means solving the same block themselves in that time interval, since the 'solution' also involves the id of the 'wallet' solving it. Since the Bitcoin network is set up so that the total global processing power is at a level where one block gets solved every ~10 minutes (by adjusting the hashing difficulty on each block based on the last), and assuming that the attacker's window of opportunity is ten seconds (orders of magnitude higher than it actually would be), that equates to having processing power approximately equivalent to 60 times the global total processing power in order to have a 50% chance of pulling off such an attack.
This ignores, of course, the fact that if you had 60 times the computational power of the network, you would have far surpassed the 50% needed to take control of Bitcoin (the so called 50% attack). The integrity of the network depends on everyone agreeing that a given block was 'mined' by a given 'wallet' and assigning it to them. You'd need 50%+ of the network to take control of that quorum.
-
-
Tuesday 3rd July 2018 08:12 GMT -tim
Re: Time NTP was upgraded(See what I did there!)
"Sure it is a cost but you can start from £100 (for a Raspberry PI and a GPS expansion board (e.g. from uptronics), antenna, plus a funky case)"
We did that with the £40 uputronics GPS hat. I thought it was about 4 times better than the old server we had been using and then I looked closer at the numbers and it appears about 4,000 times better than the older one which was a decade old server that spent its days saving CCTV data on spinning rust. The GPS sits in the warehouse on a beam under one of the plastic skylights. The problem with the hat is it confused FreeBSD boot process since that didn't like the NMEA strings and the 1PPS driver in NTPd can't cope with adjusting the local NMEA clock so for a non-Internet NTP server, you want two Pis and one with a battery back clock to keep the time when power gets cycled.
-
Tuesday 3rd July 2018 08:27 GMT Paul Crawford
Re: £40 uputronics GPS
I think my PI + Uptronics GPS board can work stand-alone (no internet, though normally I use the 4 ntp pool servers as well) using Ubuntu with the PPS enabled. My ntp.conf has this setting:
# Add the NMEA driver using GPRMC (1) and 9600 Baud (16) mode.
# Also tell it to assume 117ms delay on RS232 and also to enable the 1pps correction using 'flag1'
server 127.127.20.0 mode 17 prefer minpoll 4 maxpoll 4
fudge 127.127.20.0 time2 0.117 flag1 1
Also needed to edit /etc/init.d/ntp to add on start the commands to create symlinks:
cd /dev ; ln -s ttyAMA0 gps0 ; ln -s pps0 gpspps0 ; cd /
-
-
-
-
-
Monday 2nd July 2018 16:32 GMT stiine
Re: Time NTP was upgraded(See what I did there!)
Bullshit. Redhat's already on that bandwagon with Chrony, and its useless. On the 400+ servers that run ntpd, I can use "ntpq -c lpeer" but on the handful of CenOS 7, hell, I don't even remember the command, to determine the time sync status.
-
-
-
-
Monday 2nd July 2018 09:28 GMT hammarbtyp
Re: There go precious milliseconds
You don't need encryption as such, you need a signature. You could take a clear text, signed response, assume it's valid and set up a "shadow" clock then check the signature in spare cycles, copying the shadow clock to the real one if it checks out?
And how do you know if your signature is from a real server? To do that you need to encrypt the signature and unencrypt it and check the server details.
To be fair it maybe you only really need to do this at connection, after this you may be able to utilise some sort of secure token
-
Monday 2nd July 2018 16:30 GMT Loyal Commenter
Re: There go precious milliseconds
And how do you know if your signature is from a real server? To do that you need to encrypt the signature and unencrypt it and check the server details.
- Ask server for time
- Receive server time
- Note local time
- Decode packet
- Note local time again
- Add the difference to time in the packet (and also add half the delay between asking for, and receiving packet as network latency)
I'm sure it's a little more complex than that, but factoring out the time taken to decrypt the packet is trivial.
-
-
Tuesday 3rd July 2018 05:47 GMT Richard 12
Re: There go precious milliseconds
They aren't.
That post roughly described how NTP works.
NTP provides clock updates, it's not a clock. It requires that the device have a local clock that is sufficiently accurate over a period of minutes.
If it drifted far enough over a few milliseconds that you couldn't measure the time taken to decrypt with sufficient accuracy, then your hardware platform is not suitable.
At the worst case, you can disable interrupts and manually count the CPU cycles taken. Decryption of a known size payload takes a known time (unless your algorithm is broken)
-
-
-
-
-
Monday 2nd July 2018 09:23 GMT hammarbtyp
And you need a powerful computer to decrypt *any* encrypted/secure time source, NTP or any other proposal. There go precious milliseconds.
And if your ISP is anything like mine, latency sucks, so I'm happy if my computers are just showing the correct date !!!!
Most embedded processors will support standard encryption protocols and we are talking a very small amount of data here. If your device is not capable of supporting encryption then it should not be connecting to the web.
For the kind of accuracy NTP provides the overhead is not going to effect accuracy. If you want greater accuracy you should be using 1588 anyway.
However there is a benefit in having a more modular scalable solution which allows you to make move the dial between security and performance. This should also be defined in the standard source code and allow you to have a core functionality and then choose to include specific features such as encryption into the final solution
-
-
Monday 2nd July 2018 08:30 GMT Nick Kew
Consumer-grade 'puters
If you take a look at the time configuration in a typical consumer computer, you'll see one or two NTP servers nominated.
Erm, yes. A typical consumer computer is a consumer of NTP. It doesn't need nor expect atomic-clock accuracy. If it's within UDP-packet timeout time of its ISP's ntp server, that's plenty adequate. Or if it just polls time hourly, daily, or probably even weekly, that'll do.
Need more accuracy? Then you're not a consumer-grade 'puter. You want a competent sysop to configure your NTP with lots of peers, and no doubt other critical setup.
Methinks this is baked in. The protocol is the quintessential UDP user: better to lose a packet than to use a delayed packet! Configuration allows for different levels of operation: peer network, polling frequency, etc. Dammit, when I first set up NTP I used chrony not ntpd, precisely because of its advertised ability to deal with intermittent connections.
-
Monday 2nd July 2018 10:06 GMT Anonymous Coward
Why not use a GPS dongle?
Any datacenter selling hosting services should have at least one server set up as a tier 1 GPS source with an actual GPS receiver.
Then the link(s) to the internet aren't vulnerable to interception/delay, and attackers would have to compromise the router (or whatever) connected to the GPS receiver.
A major datacenter could have three of them, ideally running three OSes (Cisco IOS, Linux, BSD) to make compromising two of them less likely, so this 'crowdsourcing' idea could work. Before anyone complains about how you might not be able to receive GPS inside the datacenter, they can run coax to an outside antenna.
-
Monday 2nd July 2018 10:34 GMT Anonymous Coward
NTP already implements auth...
I have to admit I'm not entirely sure what the problem is here; NTP already supports setting up basic symmetric keys to verify the connection with a remote NTP server. It's nothing special but it stops MITM timing attacks in their tracks. And if the server at the other end is compromised then you're hosed regardless of any authentication attempts.
https://access.redhat.com/solutions/393663
http://blog.ine.com/2007/12/28/how-does-ntp-authentication-work/
If your internal stuff is dependent on accurate time via NTP, then you should also have at least two internal clocks - as DougS points out it needn't break the bank, you can set up a Rapberry Pi with a GPS + PPS PiHat for less than £100 and that'll give you a "easily good enough" time source for millisecond accuracy (and for most businesses, second accuracy is perfectly good enough). Radio signal receivers are another relatively inexpensive option (and useful in a data centre where you might not be able to install an external GPS antenna). Install three or more and you can generally forego having to look outside your own network for NTP at all.
Bog-standard NTP and commercial clocks (which are usually just a linux box running some version of bog-standard NTP) should all support auth keys without issue (although TTBOMK windows' NTP implementation doesn't support it). Then you might want to think about using external NTP servers as tertiary sources - and again it's quite easy to fudge them to specify their stratum value as much worse than your internal ones, so even if evil haXx0rz perform timing attacks on a majority of your external tertiary servers your internal servers should still be following your internal clocks.
Call me cynical but wanting to implement a CA/PKI setup over the top of an NTP-ish protocol sounds a lot like another power grab by the people who want to set themselves up holding the keys in the same way that google seem to want to force everyone away from being able to use their own SSL certificates.
-
Monday 2nd July 2018 11:28 GMT Christian Berger
It's not an actual problem
I mean, yes, you can shift the time of servers around, in theory, if you put lots of effort into it and if the server operator doesn't have its own local NTP infrastructure, but in reality that's just a lot of hassle for little profit.
Clients typically don't care about NTP at all and only implement it's braindead cousin SNTP which gives you a very rough approximation of the actual time and date.
GPS sounds like a good idea, until you are inside, however for mobile devices, which have GPS anyhow, this is a sensible way to get a rather decent precision of time.
In some places, like Europe you have the additional possibility of getting your time via longwave transmitters. The DCF77 signal, carries the time in a way you can get your error well down below a millisecond. Other simmilar transmitters will still get you the time to a fraction of a second.
-
Monday 2nd July 2018 13:02 GMT BlartVersenwaldIII
Re: It's not an actual problem
> Clients typically don't care about NTP at all and only implement it's braindead cousin SNTP which gives you a very rough approximation of the actual time and date.
I guess it depends on the type and size of clients but it's quiet common even in small windows shops to have:
a) some of the edge networking kit go out to the various internet NTP servers to query time
b) present that time internally via an internal NTP server on the same networking kit (usually a requirement of other bits of networked kit e.g. telephone PBX)
c) one or two windows domain controllers configured to grab their time over NTP (not SNTP) straight from this network kit
d) all domain controllers sending SNTP to the windows clients
So whilst clients may not care about NTP and are content to sleep with the braindead cousin, they're frequently indirectly dependant on it by virtue of getting the domain controllers to know what year it is.
-
Monday 2nd July 2018 14:07 GMT Charles 9
Re: It's not an actual problem
"In some places, like Europe you have the additional possibility of getting your time via longwave transmitters. The DCF77 signal, carries the time in a way you can get your error well down below a millisecond. Other simmilar transmitters will still get you the time to a fraction of a second."
The US equivalent is WWV out of Fort Collins, Colorado, which gets its timebase from NIST in nearby Boulder. It transmits several different time signals with varying degrees of precision.
-
-
Monday 2nd July 2018 11:34 GMT Crisp
Simply fit all computers with sundials.
Then to calibrate the internal clock, simply let your pc sit in the sun for an hour or two to track the sun across the sky and provide absolute precision.
No new protocol needed.
I really think these so-called "boffins" tend to over think these things.
-
Monday 2nd July 2018 12:23 GMT BlartVersenwaldIII
Re: Simply fit all computers with sundials.
...until you forget to unplug the sundial, some bright spark installs a Sun server in your data centre, then all of a sudden the sunlight changes completely and your time goes completely out of whack! Unless you move the Sun around the room in the proper way, your sundial will always read the same time.
-
Monday 2nd July 2018 13:06 GMT Lotaresco
Re: Simply fit all computers with sundials.
You're under-thinking this. As John Taylor observed, if you are designing something to do a job, it is better to have it doing two things rather than one. Hence in this case, the sundial, excellent as it may be, is second fiddle to a Sumerian Water Clock. We can use the Water Clock for processor cooling as well as a time signal.
-
Monday 2nd July 2018 14:03 GMT BlartVersenwaldIII
Re: Simply fit all computers with sundials.
> We can use the Water Clock for processor cooling as well as a time signal.
You're over-under-thinking it! If you did that, different loads will heat the water up to different amounts, resulting in changes in water density and thus changes in the temporal dampenflux. You're better off using the heat from the processor to boil the water so that it can power a steam turbine to generate electricity to wind the pendulum.
-
-
-
Monday 2nd July 2018 20:15 GMT onefang
“in order to succeed in shifting time at a Chronos client by even a small time shift (e.g., 100ms), even a powerful man-in-the-middle attacker requires many years of effort (e.g., over 20 years in expectation).”
Ah, but if you do it often enough, all those 100ms time shifts eventually add up to 20 years, and you can get your attack finished in no time. I refer interested commentards to the 50th anniversary episode of Doctor Who for two good demonstrations of this principle in operation.
-
Monday 2nd July 2018 20:40 GMT hayzoos
time doesn't exist, unless I believe it
Encrypting/decrypting a time query/answer will occur at a known interval, adjust accordingly.
Aren't you supposed to use a relatively local ntp server? for multiple reasons, think it through.
It's all relative, I like that one.
My system clock may be off, I think it's beer-thirty.
-
Tuesday 3rd July 2018 14:18 GMT Gary Bickford
One area of concern/complication - long lag time environments such as space
While it may not seem to be important yet, if/when habitats, labs, and colonies are established in space, the long data transfer times based on lightspeed will need to be accommodated. In that environment transfer lags of minutes, hours, or even days may become common. Future proofing NTP will be important.
Of course it is _possible_ that a future solar-system-wide time reference, possibly based on the proposed absolute positioning system using galactic markers, and known orbital coordinates of solar system bodies, might provide a useful backup timestamp, down to some basic time resolution.
-
Tuesday 3rd July 2018 14:30 GMT onefang
Re: One area of concern/complication - long lag time environments such as space
The main problem with your "transfer lags of minutes, hours, or even days" is the two minute timeout of TCP/IP. By the time there have been enough minutes to earn the plural designation, the sending system assumes the packet got lost. Forget about hours or days.
A different base protocol will be needed, possibly based on something that is currently being used in deep space missions. Then all the protocols for the next layer might need tweaking, if they assume TCP/IP timeouts.
I'm guessing these sorts of things are already solved problems in deep space spacecraft, their clocks likely have to be in sync with ground based clocks, so they know to send their collected data at the right time, or miss completely, know to fire their rockets at the correct time, etc.
-
-
Tuesday 3rd July 2018 17:35 GMT JWLong
Mum
She gave me a Timex in '63 for my birthday.
And it's still taken' a lick'n, because it's still tick'n.
Even when the power goes out. No batteries, no UPS, no MITM worries.
Some things in life just ain't worth changing. Kinda like, have you ever heard the old home phone ring when the power was out. Yeah, that kinda thing.
Now, it's time for a bowel movement. No Timex moment there.
-
Tuesday 3rd July 2018 19:51 GMT onefang
Re: Mum
"Some things in life just ain't worth changing. Kinda like, have you ever heard the old home phone ring when the power was out. Yeah, that kinda thing."
All my mobile phones will still ring if the power is out, and I can keep them charged to. Which was important when we had that week long power outage. I even charged my neighbours phone during that blackout a few times. I even have that old style ringing sound. I don't have a landline phone.
-
Wednesday 4th July 2018 19:37 GMT SImon Hobson
Re: Mum
All my mobile phones will still ring if the power is out
Don't count on that !
They will still work IFF the outage is localised enough for there still to be a cell still powered up AND still have communications back to the network. That is most definitely not always the case !
Suddenly people realised that, without electricity, there is no internet, no mobile phones, no contactless payment, no lifts and no petrol pumps.
Most mobile phone coverage was lost within an hour
The biggest impact on most people was that few knew what was happening. By looking out of the window, it was obvious that there was a widespread power cut but none of the usual sources of information – TV, internet, text messages or social media – was working.
The point is, while this was an extraordinary event - I know from inside knowledge that there have been a few "near misses" in terms of substations being flooded, even after work to raise the level of flood protection at many. Lancaster was lucky in some ways - they were able to draft in generators to get supplies back on fairly quickly while sorting out the main substation. If two such events happened close together (far from inconceivable) then there may well not have been the numbers of large generators required.
And then we need to factor in "modern" supply management policy. Once upon a time, the electricity supply industry was run by engineers with a brief of "keep the lights on". Generator capacity was organised to have a diversity of fuelling, with spare capacity and some pumped storage to help manage the "half time tea break" surges and the like. That was abandoned under Thatcher, and centralised forward planning was replaced by "kick the can down the road" politics (no new nuclear for decades) plus free market "what can I make out of this" planning by multiple competing suppliers. They are now pushing so called "smart" meters for one primary function - what is euphemistically called "demand side load management". The combination of "tin kicking" and lack of planning now results in a supply system without enough spare to cope with forseeable peak demands - so "smart" meters are there to control demand, firstly by price rationing (if you want to cook dinner at dinner time, tough, it'll cost you 10x the normal rate), and if that fails by more fine grained rolling power cuts (many of us remember the 70s). Yes, remote disconnection is part of the spec, and therefore in EVERY "smart" meter for someone to, somewhere, to click a button and your power goes off.
Of course, we are promised that there are sufficient safeguards etc, etc - but I guess it's tough luck if your power is turned off and it's up to you to persuade your supplier that their billing system has got it wrong and you don't owe them £20,000 ! (sarcasm)Oh no, mistakes like that never ever happen do they. (super-sarcasm)And of course, we all believe that no-one will turn off the wrong meeting.
-
-
Wednesday 4th July 2018 22:52 GMT onefang
Re: Connections, connections
"But the chance of there being no operating tower your phone can connect to is probably smaller than the likelihood of the outage taking down the exchange your landline is connected to."
In my case the "exchange" is the big central Telstra building that the entire capital city runs through to get to the rest of the world, and I'm surrounded by underground fibre that supplies myself and the cell towers around me. Anything that takes out all the towers in range of my home either took out that exchange, in which case the entire city is fucked and no one's calling me anyway, or the entire suburb has been leveled (yet somehow missed the exchange), and my corpse is in no condition to be answering what's left of my phone. So I'd guess the chance is about even.
Icon for what might cause such a sorry state of affairs ->
-
Monday 9th July 2018 18:44 GMT SImon Hobson
Re: Connections, connections
But the chance of there being no operating tower your phone can connect to is probably smaller than the likelihood of the outage taking down the exchange your landline is connected to
As long as we're talking about the UK, then no - quite the reverse.
BT exchanges have some 'kin big batteries that will keep it running for some time, and I believe some larger ones have permanent generators present to take over.
Mobile phone towers are a different matter. They may well have batteries, but nothing like the scale BT exchanges have, and I doubt if many at all have on site generators.
TL;DR - if the power goes off, the mobile towers will stop working before the BT exchanges.
Well that's for voice, data is a bit more complicated. ADSL uses kit installed in the exchanges - so in principle ADSL will keep working as well. VDSL uses active street cabinets, so that will only keep working as long as the internal batteries last - and there's going to be no generator getting plugged into it because (like the mobile network, but on a bigger scale) there are quite a lot of them !
-
-
-
-