{"id":125480,"date":"2020-09-30T17:15:47","date_gmt":"2020-09-30T17:15:47","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2020\/09\/pouvez-vous-nous-consacrer-une-minute-la-securite-de-lheure-sur-les-reseaux-a-lhonneur-dans-le-podcast-de-the-hedge\/"},"modified":"2025-11-27T17:44:55","modified_gmt":"2025-11-27T17:44:55","slug":"pouvez-vous-nous-consacrer-une-minute-la-securite-de-lheure-sur-les-reseaux-a-lhonneur-dans-le-podcast-de-the-hedge","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/fr\/blog\/2020\/09\/pouvez-vous-nous-consacrer-une-minute-la-securite-de-lheure-sur-les-reseaux-a-lhonneur-dans-le-podcast-de-the-hedge\/","title":{"rendered":"Pouvez-vous nous consacrer une minute ? La s\u00e9curit\u00e9 de l&rsquo;heure sur les r\u00e9seaux \u00e0 l&rsquo;honneur dans le podcast de The Hedge"},"content":{"rendered":"\n<p>Envie d&rsquo;en savoir plus sur le protocole de l&rsquo;heure sur les r\u00e9seaux (NTP) et la <a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/securite-de-synchronisation\/\">s\u00e9curit\u00e9 de l&rsquo;heure sur les r\u00e9seaux<\/a> (NTS), et de d\u00e9couvrir pourquoi la synchronisation de l&rsquo;heure est un fondement essentiel de la s\u00e9curit\u00e9 en ligne ?<\/p>\n\n<p><strong>Aujourd&rsquo;hui nous c\u00e9l\u00e9brons la <a href=\"https:\/\/internationalpodcastday.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Journ\u00e9e internationale du podcast<\/a>, alors pourquoi ne pas la passer \u00e0 \u00e9couter le <a href=\"https:\/\/rule11.tech\/the-hedge-podcast-49-karen-odonoghue-and-network-time-security\/\">podcast n\u00b049 de The Hedge : Karen O&rsquo;Donoghue et la s\u00e9curit\u00e9 de l&rsquo;heure sur les r\u00e9seaux<\/a><\/strong>.<br\/><\/p>\n\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler\"><div class=\"wp-block-embed__wrapper\">\n<audio class=\"wp-audio-shortcode\" id=\"audio-125480-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/content.blubrry.com\/hedge\/hedge-049.mp3?_=1\" \/><a href=\"https:\/\/content.blubrry.com\/hedge\/hedge-049.mp3\">https:\/\/content.blubrry.com\/hedge\/hedge-049.mp3<\/a><\/audio>\n<\/div><\/figure>\n\n<p>Le NTP est l&rsquo;un des plus anciens protocoles Internet en usage. Il permet la synchronisation des horloges sur les r\u00e9seaux informatiques \u00e0 quelques millisecondes pr\u00e8s du temps universel coordonn\u00e9 (UTC) standard. L&rsquo;exactitude de l&rsquo;heure est \u00e9galement un \u00e9l\u00e9ment essentiel de la s\u00e9curit\u00e9 en ligne, et de nombreux m\u00e9canismes de s\u00e9curit\u00e9, tels que la <a href=\"https:\/\/www.internetsociety.org\/deploy360\/tls\/basics\/\">s\u00e9curit\u00e9 de la couche transport<\/a>(TLS) ainsi que la cr\u00e9ation et la v\u00e9rification des signatures num\u00e9riques, d\u00e9pendent de la pr\u00e9cision horaire. <\/p>\n\n<p><strong>Modernisation des m\u00e9canismes <\/strong><\/p>\n\n<p>Les m\u00e9canismes de s\u00e9curit\u00e9 du NTP ont cependant \u00e9t\u00e9 con\u00e7us \u00e0 une \u00e9poque o\u00f9 le risque d&rsquo;attaque \u00e9tait peu probable. En raison de l&rsquo;expansion continue d&rsquo;Internet, ces m\u00e9canismes sont devenus obsol\u00e8tes. Depuis de nombreuses ann\u00e9es, l&rsquo;<a href=\"https:\/\/www.internetsociety.org\/fr\/about-the-ietf\/\">Internet Engineering Task Force<\/a> (IETF) travaille sur le sujet via son groupe d\u00e9di\u00e9 (Network Time Protocol Working Group), d\u00e9sireux de d\u00e9velopper une technologie de remplacement qui contribuera \u00e0 s\u00e9curiser l&rsquo;infrastructure de synchronisation de l&rsquo;heure sur Internet \u00e0 long terme. Le r\u00e9sultat de ce travail est en cours de finalisation sous le nom de RFC 8915 Network Time Security for the Network Time Protocol. <a href=\"https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ntp-using-nts-for-ntp\/\">L&rsquo;avant-projet actuel est disponible ici<\/a>.<\/p>\n\n<p><strong>L&rsquo;importance de la s\u00e9curit\u00e9 de l&rsquo;heure <\/strong><\/p>\n\n<p>Dans cet \u00e9pisode de The Hedge Podcast, Karen O&rsquo;Donoghue, directrice de l&rsquo;Internet Trust and Technology, parle de la n\u00e9cessit\u00e9 de s\u00e9curiser l&rsquo;heure sur les r\u00e9seaux et des d\u00e9fis que repr\u00e9sentent le d\u00e9veloppement et le d\u00e9ploiement d&rsquo;un nouveau protocole. Elle parle des fonctions quotidiennes qui requi\u00e8rent une heure s\u00fbre et pr\u00e9cise, notamment les transactions financi\u00e8res, les syst\u00e8mes d&rsquo;alimentation \u00e9lectrique et les syst\u00e8mes de transport. Elle explore \u00e9galement le r\u00f4le de la communaut\u00e9 des logiciels libres dans l&rsquo;\u00e9volution du NTS.<\/p>\n\n<p>Karen met \u00e9galement en \u00e9vidence les \u00e9l\u00e9ments cl\u00e9s du projet de la s\u00e9curit\u00e9 de l&rsquo;heure de l&rsquo;Internet Society. Ce projet promeut la s\u00e9curit\u00e9 de l&rsquo;heure en tant qu&rsquo;\u00e9l\u00e9ment cl\u00e9 d&rsquo;un Internet s\u00fbr et fiable, et souligne les efforts d\u00e9ploy\u00e9s pour am\u00e9liorer la s\u00e9curit\u00e9 globale de l&rsquo;heure en soutenant les travaux visant \u00e0 encourager le d\u00e9veloppement, la mise en \u0153uvre et le d\u00e9ploiement de la NTS pour le NTP. <\/p>\n\n<p><em><a href=\"https:\/\/www.internetsociety.org\/fr\/issues\/securite-de-synchronisation\/\">D\u00e9couvrez le projet portant sur la s\u00e9curit\u00e9 de l&rsquo;heure de l&rsquo;Internet Society <\/a> !<\/em><\/p>\n\n<hr class=\"wp-block-separator\"\/>\n\n<p><em>Image de Jane Carmona <a href=\"https:\/\/unsplash.com\/photos\/JRykcV9Dqhc\">via Unsplash<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Envie d&rsquo;en savoir plus sur le protocole de l&rsquo;heure sur les r\u00e9seaux (NTP) et la s\u00e9curit\u00e9 de l&rsquo;heure sur les r\u00e9seaux (NTS), et de d\u00e9couvrir pourquoi la synchronisation de l&rsquo;heure est un fondement essentiel de la s\u00e9curit\u00e9 en ligne ? Aujourd&rsquo;hui nous c\u00e9l\u00e9brons la Journ\u00e9e internationale du podcast, alors pourquoi ne pas la passer \u00e0 [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":124449,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[6187,169,4909,4775,4905],"tags":[6298],"region_news_regions":[6029],"content_category":[6101],"ppma_author":[4040,4224],"class_list":["post-125480","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-comment-fonctionne-internet","category-les-normes-internet-ouvertes","category-renforcer-internet","category-securite-fr","category-securite-de-synchronisation","tag-securite-de-synchronisation","region_news_regions-mondial","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-150x150.jpg",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-450x193.jpg",450,193,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-768x330.jpg",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-1024x440.jpg",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-250x107.jpg",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast-600x550.jpg",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2020\/09\/network-time-security-hedge-podcast.jpg",600,258,false]},"uagb_author_info":{"display_name":"April Froncek","author_link":"https:\/\/www.internetsociety.org\/fr\/author\/froncek\/"},"uagb_comment_info":0,"uagb_excerpt":"Envie d&rsquo;en savoir plus sur le protocole de l&rsquo;heure sur les r\u00e9seaux (NTP) et la s\u00e9curit\u00e9 de l&rsquo;heure sur les r\u00e9seaux (NTS), et de d\u00e9couvrir pourquoi la synchronisation de l&rsquo;heure est un fondement essentiel de la s\u00e9curit\u00e9 en ligne ? Aujourd&rsquo;hui nous c\u00e9l\u00e9brons la Journ\u00e9e internationale du podcast, alors pourquoi ne pas la passer \u00e0\u2026","authors":[{"term_id":4040,"user_id":15,"is_guest":0,"slug":"froncek","display_name":"April Froncek","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2022\/02\/april-froncek-profile.jpeg"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""},{"term_id":4224,"user_id":1232,"is_guest":0,"slug":"gray","display_name":"Susannah Gray","avatar_url":{"url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/02\/susannah575-268x300-e1654852540586.png","url2x":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2019\/02\/susannah575-268x300-e1654852540586.png"},"0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/125480","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/comments?post=125480"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/posts\/125480\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media\/124449"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/media?parent=125480"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/categories?post=125480"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/tags?post=125480"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/region_news_regions?post=125480"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/content_category?post=125480"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/fr\/wp-json\/wp\/v2\/ppma_author?post=125480"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}