[dhcwg] Re: [ntpwg] Network Time Protocol (NTP) Options for DHCPv6

"David L. Mills" <mills@udel.edu> Wed, 14 November 2007 13:11 UTC

Return-path: <dhcwg-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IsI1d-0003Cf-Qu; Wed, 14 Nov 2007 08:11:25 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IrGGz-0001gB-Fn for dhcwg@ietf.org; Sun, 11 Nov 2007 12:07:01 -0500
Received: from whimsy.udel.edu ([128.4.2.3]) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IrGGy-0008Bw-CB for dhcwg@ietf.org; Sun, 11 Nov 2007 12:07:01 -0500
Received: by whimsy.udel.edu (Postfix, from userid 62) id 1278D1684; Sun, 11 Nov 2007 17:06:57 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.1.1 (2006-03-10) on whimsy.udel.edu
X-Spam-Level:
X-Spam-Status: No, score=-2.1 required=4.1 tests=ALL_TRUSTED,AWL,BAYES_00 autolearn=ham version=3.1.1
Received: from [128.4.2.6] (backroom.udel.edu [128.4.2.6]) by whimsy.udel.edu (Postfix) with ESMTP id 7A67D165A; Sun, 11 Nov 2007 17:06:52 +0000 (UTC)
Message-ID: <473736A7.5000801@udel.edu>
Date: Sun, 11 Nov 2007 17:06:47 +0000
From: "David L. Mills" <mills@udel.edu>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en
References: <A05118C6DF9320488C77F3D5459B17B7062ED3C6@xmb-ams-333.emea.cisco.com> <4733482A.7020302@sun.com> <A05118C6DF9320488C77F3D5459B17B70634E4E5@xmb-ams-333.emea.cisco.com> <4735A243.6090905@sun.com> <47368636.3070007@udel.edu> <4736F7A7.2090707@sun.com>
In-Reply-To: <4736F7A7.2090707@sun.com>
X-Sanitizer: This message has been sanitized!
X-Sanitizer-URL: http://mailtools.anomy.net/
X-Sanitizer-Rev: UDEL-ECECIS: Sanitizer.pm, v 1.64 2002/10/22 MIME-Version: 1.0
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Spam-Score: 1.6 (+)
X-Scan-Signature: 14582b0692e7f70ce7111d04db3781c8
X-Mailman-Approved-At: Wed, 14 Nov 2007 08:11:04 -0500
Cc: ntpwg@lists.ntp.org, dhcwg@ietf.org
Subject: [dhcwg] Re: [ntpwg] Network Time Protocol (NTP) Options for DHCPv6
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: dhcwg.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Errors-To: dhcwg-bounces@ietf.org

Brian,

My model about the keys is that the DHCP server would supply a key ID 
for the NTP server(s) as configured, but not the keys themselves. The 
keys would have to be configured for the NTP server and client 
separately. The DHCP server would be responsible only for the opaque key ID.

There is an issue about the security of the DFCP server itself; that is 
another issue. I'm assuming the DHCP server is behind the firewall.

The mode specification could be any of the valid NTP modes. If client 
(3) it would be an ordinary client/server association. A means would be 
necessary to specify broadcast client, as that is not a mode in the 
strict sense. It could be symmetric active (1), in which case the victim 
would initiate that type association. To specify symmetric passive (2) 
means that the victim should wait for a symmetric active (1) packet. 
This does not seem useful.

Dave

Brian Utterback wrote:

> David L. Mills wrote:
>
>>
>> 1. Listen for broadcast/multicast on <address> and do/do not execute 
>> a volley. I like the delay field to enable/disable that and have 
>> added it to ntpd. In principle, the delay can be determined from the 
>> DHCP packets themselves, a feature that might be added.
>>
> Right, I am fine with having the delay given and novolley specified. 
> You can't determine the delay from the DHCP
> packets because the DHCP server is likely not the NTP server. The DHCP 
> server may be multiple hops away.
>
>> 2. Troll the pool at one of the pool DNS names, us.pool.ntp.org, etc. 
>> The client should be smart enough to use/not use iburst and preempt 
>> flags.
>
>
> This argues for having another possible field/format, where a string 
> for lookup is given.
>
>>
>> 3. Specify a list of <addresses> to send to, each together with the 
>> mode and  minpoll. I don't think maxpoll is useful either.
>
>
> What other mode than active client do you envision?
>
>>
>> 4. Specify a manycast server group address, ttl limit and beacon 
>> interval.
>
>
> Okay.
>
>>
>> In the broadcast/multicast, pool and manycast schemes, we need the 
>> optional tos floor and tos ceiling and tos cohort commands as well. 
>> All schemes may need the key ID or Autokey flag.
>
>
> Interesting. I agree that a key needs to be specified somehow, but it 
> is not clear
> to me how to do it. We have to assume that the client does not have 
> the same NTP
> keys. However, we would like a way to specify a server and keys 
> securely, so that
> the security of the network depends only on the security of DHCP. 
> Again I am not
> up to date, *is* there a secure DHCP? If so, then how to get keys to 
> the clients
> becomes an issue.
>
>
>>
>> All this makes me nervous. A possible alternative is simply to send a 
>> configuration file like the ntpq program can now. However, this of 
>> course is implemention specific. It might be useful to provide the 
>> name of a local configuration file only. The most important thing is 
>> to make it flexible for use by current ntpd and possibly others.
>>
> It seems (as you said) that a general purpose configuration mechanism 
> is needed. One that
> is implementation neutral. We have talked in the past about config 
> over LDAP and HTTP.
> Maybe we need to revist that. It would not have to be built into ntpd, 
> though, it could easily
> live as a separate process.
>
> Brian
>
>>
>


_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg