Skip to main content

Table 1 Exploited TLVs, details on attacks possible with these TLVs are presented in Sect. 5

From: Time sensitive networking security: issues of precision time protocol and its implementation

TLV

Security problem

DISABLE_PORT

Exploitation: Denial of service

DELAY_MECHANISM

Exploitation: Denial of service

CLOCK_DESCRIPTION

Reconnaissance: Topology map

USER_DESCRIPTION

Reconnaissance: Topology map

PRIORITY1

Exploitation: BMC tampering

PRIORITY2

Exploitation: BMC tampering

CLOCK_ACCURACY

Exploitation: BMC tampering