Kerberos Clock Synchronization
This document discusses the security vulnerabilities that can exist in the Kerberos protocol and related protocols when clock synchronization is insecure, alternative methods that can be used to reduce or eliminate dependency on secure clock synchronization, and sanity checks which can be used when setting the system clock using an insecure time source as a reference in order to remove security vulnerabilities.