Re: [dhcwg] Re: [ntpwg] Network Time Protocol (NTP) Options for DHCPv6

Danny Mayer <mayer@ntp.org> Fri, 16 November 2007 20:53 UTC

Return-path: <dhcwg-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1It8C2-0000XS-6h; Fri, 16 Nov 2007 15:53:38 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1It8C1-0000XM-HY for dhcwg@ietf.org; Fri, 16 Nov 2007 15:53:37 -0500
Received: from exchdev.pega.com ([198.22.153.35] helo=exchdev.rpega.com) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1It8C0-0000cH-Vd for dhcwg@ietf.org; Fri, 16 Nov 2007 15:53:37 -0500
Received: from [10.60.98.37] ([10.60.98.37]) by exchdev.rpega.com with Microsoft SMTPSVC(6.0.3790.1830); Fri, 16 Nov 2007 15:53:36 -0500
Message-ID: <473E02B4.2050308@ntp.org>
Date: Fri, 16 Nov 2007 15:51:00 -0500
From: Danny Mayer <mayer@ntp.org>
User-Agent: Thunderbird 2.0.0.9 (Windows/20071031)
MIME-Version: 1.0
To: "David W. Hankins" <David_Hankins@isc.org>
Subject: Re: [dhcwg] Re: [ntpwg] Network Time Protocol (NTP) Options for DHCPv6
References: <A05118C6DF9320488C77F3D5459B17B7062ED3C6@xmb-ams-333.emea.cisco.com> <4733482A.7020302@sun.com> <A05118C6DF9320488C77F3D5459B17B70634E4E5@xmb-ams-333.emea.cisco.com> <4735A243.6090905@sun.com> <47368636.3070007@udel.edu> <4736F7A7.2090707@sun.com> <473D1BEB.1090102@ntp.org> <20071116134803.GB18883@isc.org>
In-Reply-To: <20071116134803.GB18883@isc.org>
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 16 Nov 2007 20:53:36.0336 (UTC) FILETIME=[C1E44D00:01C82892]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 0fa76816851382eb71b0a882ccdc29ac
Cc: ntpwg@lists.ntp.org, dhcwg@ietf.org
X-BeenThere: dhcwg@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: dhcwg.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:dhcwg@ietf.org>
List-Help: <mailto:dhcwg-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/dhcwg>, <mailto:dhcwg-request@ietf.org?subject=subscribe>
Errors-To: dhcwg-bounces@ietf.org

David W. Hankins wrote:
> On Thu, Nov 15, 2007 at 11:26:19PM -0500, Danny Mayer wrote:
>> Brian Utterback wrote:
>>> Interesting. I agree that a key needs to be specified somehow, but it
>>> is not clear to me how to do it. We have to assume that the client
>>> does not have the same NTP keys. However, we would like a way to
>>> specify a server and keys securely, so that the security of the
>>> network depends only on the security of DHCP. Again I am not up to
>>> date, *is* there a secure DHCP? If so, then how to get keys to the 
>>> clients becomes an issue.
> 
> Although DHCPv6 does have a signature verification mechanism, it does
> not encrypt carried configuration.
> 
> So unless you're transferring public keys for NTP, there's an exposure
> problem I'm not sure you're aware of.  Just making sure you know, I'm
> not familiar with the keys discussed in this context.
> 
I am aware of it, thanks. It was part of what I was trying to hilight.
> 
> Next, I want to make sure that your expectations of the services
> DHCPv6 can provide are set appropriately.
> 
> Others have pointed out DHCPv6's authentication mechanism uses shared
> secrets; there is also a similar mechanism for DHCPv4, RFC3118
> "Authentication for DHCP Messages" (which 3315 says its method is
> based upon).  You should know that this has not been well deployed in
> DHCPv4, and it shares very similar design features to RFC3315's
> authentication.  The primary problem is that for most networks in
> operation, "configure a shared secret on all of your clients" defeats
> the purpose of the "Dynamic" in DHCP.  If you have to manually
> configure all your clients with a key, why bother using DHCP at all?
> You may as well manually configure them all with the final
> configuration state and skip a lot of needless machinery.
> 

Well we are only responding to an effort to do this via DHCP. We cannot
say for sure that this is the best method to do this and obviously it's
not the only method. Of course you might say why bother with DHCP for
that matter?

> So although it can be done, no one actually does it.
> 
> I understand that 3315 authentication has precisely the same barrier,
> that the client's keys are distributed "out of band."  I have no
> reason to think that IPv6 makes operators more interested in manually
> configuring clients to obtain dynamic configuration state than they
> have been in IPv4.
> 
> This is surmountable I think, it's possible the authentication methods
> might be extended and improved to remove this barrier to adoption, but
> there have been zero drafts to date which attempt to do so.
> 
> So, expectations.
> 
> 
> Your expectations should be:  No one will use 3315 authentication as
> it is, and therefore you will not have a cryptographically secured
> means to deliver this information on real networks.  People will,
> however, take special care with their DHCPv6 protocol packets on their
> networks (firewalling, etc, just as many always have done in IPv4),
> and there exists the potential for improvement and actual deployment
> of cryptographic trust here at some future date.

Agreed.

There are a whole slew of issues regarding provisioning of a system
during the booting process (and other times) that need to be worked out.
Specifically the network configuration and booting order of network
configs for DHCP, DNS, NTP, syslog, SSH, SNMP, etc.

At some point we really need to sit down and thrash out how to do this
in a secure way, in what order that it makes sense, error conditions,
etc. I'm not sure what the DHCP folks have been discussing so I bring it
all up and you can tell us what's already been solved and how.

Danny

_______________________________________________
dhcwg mailing list
dhcwg@ietf.org
https://www1.ietf.org/mailman/listinfo/dhcwg