[Ntp] Antw: [EXT] Re: Antwort: Re: Symmetric mode

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Thu, 22 September 2022 08:11 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA500C14F74D for <ntp@ietfa.amsl.com>; Thu, 22 Sep 2022 01:11:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.906
X-Spam-Level:
X-Spam-Status: No, score=-6.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RPC2VG_CcAXZ for <ntp@ietfa.amsl.com>; Thu, 22 Sep 2022 01:11:52 -0700 (PDT)
Received: from mx3.uni-regensburg.de (mx3.uni-regensburg.de [IPv6:2001:638:a05:137:165:0:4:4e79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B539EC1522DA for <ntp@ietf.org>; Thu, 22 Sep 2022 01:11:51 -0700 (PDT)
Received: from mx3.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 0657E6000055 for <ntp@ietf.org>; Thu, 22 Sep 2022 10:11:46 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx3.uni-regensburg.de (Postfix) with ESMTP id D7C3C600004D for <ntp@ietf.org>; Thu, 22 Sep 2022 10:11:45 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Thu, 22 Sep 2022 10:11:45 +0200
Message-Id: <632C18BF020000A10004E004@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.4.1
Date: Thu, 22 Sep 2022 10:11:43 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: mlichvar@redhat.com
Cc: "ntp@ietf.org" <ntp@ietf.org>
References: <880b8ec4-e112-e2e2-f48c-c940064bc749@pdmconsulting.net> <mayer@pdmconsulting.net> <796c33e6-02dc-0665-c8a2-a143f9100bdd@pdmconsulting.net> <20220919024614.4AB8328C1E2@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <YygwAeTMeSHXXk6t@localhost> <OF42F0D0F6.E94FA935-ONC12588C3.005225C3-C12588C3.0054DC8B@ptb.de> <d13df0b6-7c47-820e-5dbd-21dd7e2d4801@pdmconsulting.net> <YywRhCmTD4mt8KTy@localhost> <60E0A8800200001A6A6A8CFC@gwsmtp.uni-regensburg.de> <64395FC0020000E55AEBDC6A@gwsmtp.uni-regensburg.de> <E2CB9EB502000031FDA5B133@gwsmtp.uni-regensburg.de> <114E6FEE020000C76A6A8CFC@gwsmtp.uni-regensburg.de> <BBAE8F72020000195CC44D44@gwsmtp.uni-regensburg.de> <E42BB2AA020000A05AEBDC6A@gwsmtp.uni-regensburg.de> <419B8728020000DF6A6A8CFC@gwsmtp.uni-regensburg.de>
In-Reply-To: <419B8728020000DF6A6A8CFC@gwsmtp.uni-regensburg.de>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/-9uBJ2GA1dFTyZYDykYD9qpbcR0>
Subject: [Ntp] Antw: [EXT] Re: Antwort: Re: Symmetric mode
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Sep 2022 08:11:57 -0000

>>> Miroslav Lichvar <mlichvar@redhat.com> schrieb am 22.09.2022 um 09:40 in
Nachricht <YywRhCmTD4mt8KTy@localhost>:
> On Wed, Sep 21, 2022 at 07:30:06PM ‑0400, Danny Mayer wrote:
>> > Again, could you qualify which of these statements you disagree with
>> > and/or how so?
>> 
>> Symmetric peer associations are not ephemeral since both sides keep
>> information of each other the same way that any client does.
> 
> Quoting from RFC 5905:
>   Ephemeral associations are mobilized upon the arrival of a
>   packet and are demobilized upon error or timeout.
> 
>> An attacker
>> cannot really replay an authenticated message as it would be rejected as
>> already received.
> 
> The peer doesn't know if a received message is a new one or it was
> already sent before by one of the peers. It doesn't have an infinite
> storage and there can be messages lost in the network.
> 
> ntpd remembers only the last received packet. You can replay any
> previous message from the other peer, or the peer's own messages (last
> or previous).
> 
>> I'm not sure what is meant by limiting IP addresses to
>> prevent that since a replay attack would have to use the same IP address
to
>> send the packet.
> 
> The IP addresses and ports are not included in the data authenticated
> by the NTP MAC. You can replay an authenticated NTP messages from any
> address and any port.

But this problem isn't specific to peer messages, right? So what is the
specific peer issue?

> 
> If you restrict a key to an address and port, the advantage of the
> ephemeral association over persistent association is lost. And if you
> specify the other peer on both ends, you can just as well use the
> client/server mode. It will double the NTP traffic, but it will be
> more secure.
> 
> ‑‑ 
> Miroslav Lichvar
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org 
> https://www.ietf.org/mailman/listinfo/ntp