{"id":1370,"date":"2015-02-09T12:00:30","date_gmt":"2015-02-09T12:00:30","guid":{"rendered":"https:\/\/www.galsys.co.uk\/news\/?p=1370"},"modified":"2015-02-09T09:07:43","modified_gmt":"2015-02-09T09:07:43","slug":"ntp-authentication-explained","status":"publish","type":"post","link":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/","title":{"rendered":"NTP Authentication Explained"},"content":{"rendered":"<p><em>Synchronising time across a network is fraught with security risks and Network Time Protocol is a target for exploitation. However, NTP has a way of stopping hackers from messing with your network\u2019s time synchronisation. Discover secure authentication and the role it plays in protecting NTP.<\/em><\/p>\n<p><!--more--><\/p>\n<h2><strong>What\u2019s the Point of NTP Authentication?<\/strong><\/h2>\n<p>To instigate an <a href=\"https:\/\/www.galsys.co.uk\/news\/network-time-protocol-ddos-attacks\/\">NTP attack<\/a> a hacker hides behind their rogue host, under the pretence that they are a genuine NTP server.<\/p>\n<p>Authentication is the line of defence used by NTP to thwart the tampering of timestamps logged by devices.<\/p>\n<p>Contrary to common misconception, the purpose of NTP authentication is to verify a time source, not a client.<\/p>\n<h2><strong>How is NTP protected?\u00a0 \u00a0<\/strong><\/h2>\n<p>NTP uses Message Digest Encryption 5 (MD5) encoded keys. MD5 is a widely used, secure encryption algorithm that utilises a 128-bit cryptographic hash feature. The algorithm works by duplicating the key (or password) provided and then allocates the key to a timestamp.<\/p>\n<p>Network Time Protocol can use MD5 encoded keys to verify timestamps supplied to a time client, or server, by <a href=\"https:\/\/www.galsys.co.uk\/network-time-servers\/\">Network Time Servers<\/a>. How? By decrypting the key (password) received and matching it with an agreed set of keys. Once verified, the server or client can then authorise any actions.<\/p>\n<p>This method of NTP authentication allows a network time client, or device, to ensure that a timestamp has been generated by a trusted source, protecting NTP from malicious activity or interception.<\/p>\n<h2><strong>Authentication Explained<\/strong><\/h2>\n<p>For LINUX or UNIX <a href=\"https:\/\/www.galsys.co.uk\/ntp-servers\/\">NTP servers<\/a> you can find a list of trusted NTP authentication keys in the configuration file stored in the ntp.keys file.<\/p>\n<figure id=\"attachment_1358\" aria-describedby=\"figcaption_attachment_1358\" class=\"wp-caption aligncenter\" itemscope itemtype=\"http:\/\/schema.org\/ImageObject\" style=\"width: 340px\"><a href=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-1.jpg\"><img loading=\"lazy\" decoding=\"async\" itemprop=\"contentURL\" class=\"size-full wp-image-1358\" src=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-1.jpg\" alt=\"NTP authentication \" width=\"340\" height=\"210\" srcset=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-1.jpg 340w, https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/nts-6001-1-300x185.jpg 300w\" sizes=\"auto, (max-width: 340px) 100vw, 340px\" \/><\/a><figcaption id=\"figcaption_attachment_1358\" class=\"wp-caption-text\" itemprop=\"description\"><strong>\u2018The <a href=\"https:\/\/www.galsys.co.uk\/ntp-servers\/nts-6001-gps-ntp-server.html\">NTS 6001 GPS NTP Server<\/a> uses a LINUX operating system.\u2019<\/strong><\/figcaption><\/figure>\n<p>Each key listed consists of a key identifier, encryption identifier &amp; a password, which can be identified as followed:<\/p>\n<ul>\n<li><strong>Key identifier \u2013 <\/strong>Is depicted by a number ranging between 1 &amp; 99<\/li>\n<li><strong>Encryption identifier \u2013 <\/strong>This is used to choose the algorithm that will encode the key, often an \u2018M\u2019, referencing the use of the MD5 encryption.<\/li>\n<li><strong>The password \u2013 <\/strong>Is depicted by a set of characters in alphanumeric formation, forming \u2018the key\u2019<\/li>\n<\/ul>\n<p><strong>As a collective, a key will look something like this &#8211; 8 M gaLLeoN007<\/strong><\/p>\n<p>The key file of an NTP time server is usually very large. If you want to reduce the number of trusted keys in use you can create a subgroup. These can be itemised using the NTP configuration file \u2018ntp.conf\u2019. Using a subgroup allows you to disable compromised keys.<\/p>\n<p>To implement trusted keys use the \u2018trusted-keys\u2019 command. From your list, select the keys you want to use. Specify the key identifier number, followed by a space until you have compiled your list. It should look something like this:<\/p>\n<p>trusted-keys 4 7 14 82<\/p>\n<p>Implementing this command validates key identifiers 4, 7, 14 &amp; 82, while discounting all other keys.<\/p>\n<h2><strong>Neglecting Authentication \u00a0<\/strong><\/h2>\n<p>Neglecting NTP authentication leaves networks &amp; devices open to numerous attacks, all of which can disrupt time synchronisation. Any one of the following could occur as a result of neglecting NTP authentication:<\/p>\n<p><strong>Replay &amp; spoofing attacks \u2013 <\/strong>Whereby an intruder can intercept, delay &amp; \u2018replay\u2019 messages on a client to server or server to client basis. Any message will be properly verified, resulting in delayed replies being accepted by the client.<\/p>\n<p>Consequently, this could result in time synchronisation errors, which could prove difficult to detect because a similar problem could occur as result of \u2018normal\u2019 network behaviour.<\/p>\n<p><strong>Man-in-the-middle attacks \u2013 <\/strong>Unlike replay &amp; spoofing attacks, which do not directly impact time synchronisation quality aside from increasing apparent network delays, man-in-the-middle attacks allow an intruder to not only intercept messages, but modify &amp; replay authentic messages between a client &amp; server or between peer servers.<\/p>\n<p>This can lead to two types of attack. Firstly, a hacker can hijack a valid message from server to client, modify some fields &amp; send it, perhaps repeating it a number of times to the client. This can cause the client to authorise the message and compute an incorrect time.<\/p>\n<p>It could also dupe the client into disregarding the time provided by other servers utilised by the client.<\/p>\n<p>Secondly, a hacker can hijack a valid request message from client to server, altering some fields &amp; send it, perhaps on a repetitive basis to the client. This results in the server distributing imitation requests or supplying incorrect time to the client.<\/p>\n<p><strong>Denial of service attacks &#8211; <\/strong>Known as \u2018clogging\u2019 attacks, hackers attempt to dislodge time accuracy by overloading a network. This form of attack is quite sophisticated and does not require a hijacker to prise open genuine NTP messages, just the ability to duplicate a seemingly valid NTP package.\u00a0 <strong>\u00a0\u00a0<\/strong><\/p>\n<h2><strong>Protect Your Network\u00a0 \u00a0<\/strong><\/h2>\n<p>The installation of a <a href=\"https:\/\/www.galsys.co.uk\">Galleon Systems<\/a> time server allows you to authenticate NTP messages. Operational from behind your firewall, an NTP time server gives you increased network &amp; device security, reducing the risk of hacker attacks that could wreak havoc on your time critical systems.<\/p>\n<p>Visit the home of <a href=\"https:\/\/www.galsys.co.uk\/categories\/time-synchronisation\/time-synchronisation.html\">time synchronisation<\/a> now and invest in protection for your network. Alternatively, call <strong>0121 608 7230<\/strong> to speak to a time lord.<\/p>\n<p>For all the latest updates from Galleon Systems, including alerts regarding MSF and GPS signals, tune into our social media channels.<\/p>\n<p>Connect with us on <a href=\"https:\/\/www.facebook.com\/GalleonSystems\">Facebook<\/a>, <a href=\"https:\/\/twitter.com\/GalleonSystems\">Twitter<\/a> &amp; <a href=\"https:\/\/www.linkedin.com\/company\/galleon-systems\">LinkedIn<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Synchronising time across a network is fraught with security risks and Network Time Protocol is a target for exploitation. However, NTP has a way of stopping hackers from messing with your network\u2019s time synchronisation. Discover secure authentication and the role it plays in protecting NTP.<\/p>\n","protected":false},"author":9,"featured_media":1372,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[138,159,68,162,163,29,160,161,206],"class_list":["post-1370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-network-time-protocol","tag-network-time-servers","tag-ntp","tag-ntp-attack","tag-ntp-authentication","tag-ntp-servers","tag-nts-6001-gps-ntp-server","tag-synchronising-time","tag-time-synchronisation"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NTP Authentication Explained | Understanding NTP<\/title>\n<meta name=\"description\" content=\"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NTP Authentication Explained | Understanding NTP\" \/>\n<meta property=\"og:description\" content=\"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"Galleon Systems\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-09T12:00:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"355\" \/>\n\t<meta property=\"og:image:height\" content=\"245\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"Daniel Waldron\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GalleonSystems\" \/>\n<meta name=\"twitter:site\" content=\"@GalleonSystems\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Waldron\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/\"},\"author\":{\"name\":\"Daniel Waldron\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/c579378b6db4e297549f513ebf6f54da\"},\"headline\":\"NTP Authentication Explained\",\"datePublished\":\"2015-02-09T12:00:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/\"},\"wordCount\":868,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/ntp-configuration.gif\",\"keywords\":[\"Network Time Protocol\",\"Network Time Servers\",\"ntp\",\"NTP attack\",\"NTP authentication\",\"ntp servers\",\"NTS 6001 GPS NTP server\",\"Synchronising time\",\"Time Synchronisation\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/\",\"name\":\"NTP Authentication Explained | Understanding NTP\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/ntp-configuration.gif\",\"datePublished\":\"2015-02-09T12:00:30+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/c579378b6db4e297549f513ebf6f54da\"},\"description\":\"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/ntp-configuration.gif\",\"contentUrl\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/wp-content\\\/uploads\\\/ntp-configuration.gif\",\"width\":355,\"height\":245,\"caption\":\"NTP authentication\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/ntp-authentication-explained\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NTP Authentication Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/\",\"name\":\"Galleon Systems\",\"description\":\"Sales: 0121 608 7230\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/#\\\/schema\\\/person\\\/c579378b6db4e297549f513ebf6f54da\",\"name\":\"Daniel Waldron\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g\",\"caption\":\"Daniel Waldron\"},\"description\":\"A dedicated writer for 10 years, Daniel joined Galleon Systems in 2013. Daniel assists in the production of web copy, articles, blogs, press releases and white papers, for use by Galleon Systems' marketing team.\",\"url\":\"https:\\\/\\\/www.galsys.co.uk\\\/news\\\/author\\\/danielwaldron\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NTP Authentication Explained | Understanding NTP","description":"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/","og_locale":"en_US","og_type":"article","og_title":"NTP Authentication Explained | Understanding NTP","og_description":"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.","og_url":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/","og_site_name":"Galleon Systems","article_published_time":"2015-02-09T12:00:30+00:00","og_image":[{"width":355,"height":245,"url":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif","type":"image\/gif"}],"author":"Daniel Waldron","twitter_card":"summary_large_image","twitter_creator":"@GalleonSystems","twitter_site":"@GalleonSystems","twitter_misc":{"Written by":"Daniel Waldron","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#article","isPartOf":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/"},"author":{"name":"Daniel Waldron","@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/c579378b6db4e297549f513ebf6f54da"},"headline":"NTP Authentication Explained","datePublished":"2015-02-09T12:00:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/"},"wordCount":868,"commentCount":0,"image":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif","keywords":["Network Time Protocol","Network Time Servers","ntp","NTP attack","NTP authentication","ntp servers","NTS 6001 GPS NTP server","Synchronising time","Time Synchronisation"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/","url":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/","name":"NTP Authentication Explained | Understanding NTP","isPartOf":{"@id":"https:\/\/www.galsys.co.uk\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif","datePublished":"2015-02-09T12:00:30+00:00","author":{"@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/c579378b6db4e297549f513ebf6f54da"},"description":"NTP tutorial | Discover how NTP authentication can prevent hackers from messing with your network\u2019s time synchronisation.","breadcrumb":{"@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#primaryimage","url":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif","contentUrl":"https:\/\/www.galsys.co.uk\/news\/wp-content\/uploads\/ntp-configuration.gif","width":355,"height":245,"caption":"NTP authentication"},{"@type":"BreadcrumbList","@id":"https:\/\/www.galsys.co.uk\/news\/ntp-authentication-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.galsys.co.uk\/news\/"},{"@type":"ListItem","position":2,"name":"NTP Authentication Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.galsys.co.uk\/news\/#website","url":"https:\/\/www.galsys.co.uk\/news\/","name":"Galleon Systems","description":"Sales: 0121 608 7230","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.galsys.co.uk\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.galsys.co.uk\/news\/#\/schema\/person\/c579378b6db4e297549f513ebf6f54da","name":"Daniel Waldron","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d607f49fe9d604e52dc78e52c47b0b9f29e22043a2e9fb238426f76c8ae244f?s=96&d=mm&r=g","caption":"Daniel Waldron"},"description":"A dedicated writer for 10 years, Daniel joined Galleon Systems in 2013. Daniel assists in the production of web copy, articles, blogs, press releases and white papers, for use by Galleon Systems' marketing team.","url":"https:\/\/www.galsys.co.uk\/news\/author\/danielwaldron\/"}]}},"_links":{"self":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/1370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/comments?post=1370"}],"version-history":[{"count":3,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/1370\/revisions"}],"predecessor-version":[{"id":1375,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/posts\/1370\/revisions\/1375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/media\/1372"}],"wp:attachment":[{"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/media?parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/categories?post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.galsys.co.uk\/news\/wp-json\/wp\/v2\/tags?post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}