[Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-requirements
kristof.teichel@ptb.de Thu, 14 December 2023 14:18 UTC
Return-Path: <kristof.teichel@ptb.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7AA2C14F61C for <ntp@ietfa.amsl.com>; Thu, 14 Dec 2023 06:18:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.929
X-Spam-Level:
X-Spam-Status: No, score=-3.929 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTML_MIME_NO_HTML_TAG=0.377, MIME_HTML_ONLY=0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ptb.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iKeoXfDw4ZSS for <ntp@ietfa.amsl.com>; Thu, 14 Dec 2023 06:18:09 -0800 (PST)
Received: from mx1.bs.ptb.de (mx1.bs.ptb.de [192.53.103.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D599C14F60E for <ntp@ietf.org>; Thu, 14 Dec 2023 06:17:48 -0800 (PST)
Received: from s23397.bs.ptb.de ([172.21.101.132]) by mx1.bs.ptb.de with ESMTP id 3BEEHkxw003450-3BEEHk00003450 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 14 Dec 2023 15:17:46 +0100
MIME-Version: 1.0
Sensitivity:
In-Reply-To: <47AB979C-CAA2-47A5-ABC9-0D7D4FD94700@gmail.com>
References: <47AB979C-CAA2-47A5-ABC9-0D7D4FD94700@gmail.com>, <CA+mgmiMFLDRggrBUzdJyjhgbM6q0m8nY8PUoU5oxbR2HtZh51A@mail.gmail.com> <OF33DB0AFF.1649DFBE-ONC1258A83.002F27E4-C1258A83.0049F82B@ptb.de>
From: kristof.teichel@ptb.de
To: James <james.ietf@gmail.com>
Cc: ntp@ietf.org
Message-ID: <OFDA735B1F.EF317142-ONC1258A85.00475454-C1258A85.004E878D@ptb.de>
X-Priority: 3 (Normal)
Importance: Normal
Date: Thu, 14 Dec 2023 15:17:45 +0100
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-FEAS-Client-IP: 172.21.101.132
X-FE-Policy-ID: 5:5:5:SYSTEM
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; d=ptb.de; s=s1-ptbde; c=relaxed/relaxed; h=mime-version:references:subject:from:to:cc:message-id:date:content-type; bh=jY9tPPm4fguJLIj0Lq4QauL3Pcp08RLwJI2Q7kLKZv4=; b=ZwIrm/5oDJcD0i0WXVra2CSaeiugwrvxCuNUvye4pJQs80nOiQmtsx/sKVpEtuJHM/PDU6wz6ukL J/Sttp5qMA1bdbYRIad7XZVZanA7WbP+aOl3zv1a/hGoM6p+BJ/d6yGPqaY9qLIdv+yYAiFI9Xxl 1VGezDfxQbidp5Ih0H2Y2Xq84Exol/N40HlP7kdp37m+jASZfZmkXw5i9KKEOblfh9B08SnZ4Lip yL92jrhpWCVXmcaDIK1HDyXi5X+9tZB8tBd2U+nv/J/5+pz49mKmKClBfQZiiS5fsszl2y2m/PcM tY3K/UR2LWnVd6B57CMF4g/veZkQKMv5IuSLug==
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/529HlSCHubBQykImv-KSomkehvM>
Subject: [Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-requirements
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Dec 2023 14:18:13 -0000
>time information and synchronisation." We don't quite understand the
>implication with 'basic time information' - can you explain?
>
>"Basic time information" here is, for example a representation of
>UTC/TAI along with leap second information as opposed to extended
>timezone information, or historic leap seconds which are explicitly
>mentioned as non-requirements in a later section. This is an opening
>statement to set theme, and is not intended to be explicit in
>definition - the further subsections expand on what types of time
>information are to be part of the specification. Besides your
>question is there any specific further action here such as additional
>text, and if so could you propose something?
Since it is juxtaposed with synchronization: is the intent to use NTPv5 protocol messages for non-synchronization (e.g. just for asking "what time is it", or something)? That is where my confusion stems from.
>> 4.1 Resource Management
>> - We feel this whole section runs counter to the subsequent one
>(Data Minimization); we feel that the requirements to support
>resource management (really, mostly rate limiting, some loop
>avoidance) are overly strong; we also feel like most of these
>features are prone to misuse/abuse and pose security risks. In
>conclusion, we would like to suggest lowering/rethinking the
>requirement levels.
>
>(#3a) (#3b?) I strongly disagree. Resource management is important
>for NTPv5 to address, particularly for large scale, public
>deployments - historically it's been a big enough problem it has its
>own Wikipedia page. There's been attempts to try and find a balance
>between resource management and data minimisation - one key example
>is the requirement to not use identifiers tied back to IP addresses
>or certificates, limiting certain on-path observers. Data
>minimisation is not just "remove all unnecessary data" but also
>having focused value for what data is required. What do you propose
>exactly?
It can be important to have strong anonymity in certain situations, where it can also be important to have good guarantees that someone is who they say they are (and is authorized to use a service).
"Realizing data minimization and resource management at the same time might be difficult, as the ends used to achieve them tend to work against each other"
>> - Couldn't servers simply drop packets when over capacity, clients
>simply look for another server if theirs doesn't respond, or reduce
>their request rate? The logic would be much simpler, the security
>clearer.
>
>I disagree with this suggestion, as designed or implemented poorly
>would run the risk of DDoS, greatly impact the time for clients to
>synchronise amongst other potential issues. Dropped packets don't
>just happen when a server is congested, it can happen at any hop in
>the network when the link is congested. Explicit signalling is one of
>the ways attempting to prevent some of the challenges that have
>occurred in the past with unwanted traffic. How does your suggestion
>handle all possible scenarios of packets being dropped?
It doesn't.
>> 4.2 Data Minimisation
>> - The term "optional data" needs to be clearly defined (and in my
>opinion discussed again).
>
>I'm not sure what needs to be specified here, as what is optional and
>required comes down largely to protocol design and what client and
>server need to fulfil higher level functional requirements. What
>exactly do you propose be specified here? Could you please suggest
>something?
>> - While we agree with the point made about data minimization, we
>feel that it runs counter to many other features/aspects (timescale,
>resource management, leap seconds, security).
>
>This is unclear to me what the issue is here - could you please be
>specific of what you think is contradictory?
>> 4.3 Algorithms
>> - The headline is confusing; the context with algorithm agility
>while not discussing crypto algorithms seems prone to
>misunderstandings. Perhaps change to "Time Processing Algorithms"?
>
>The opening sentence to the section I think makes clear that it's not
>specifying anything of cryptography. That being said this is a
>trivial change that could be included later if need be.
Sure. It also doesn't feel terribly important to me.
>> - The formulation "SHOULD be obvious" seems confusing.
>
>Could you please make a suggestion or advise on what to put instead.
>> - The second paragraph seems to hint at specification-side
>modularity (on-wire protovol vs. processing algorithms vs. clock
>disciplining); while I like the idea, I believe it is controversial;
>I'm also unsure I'm even understanding the text correctly.
>
>Can you please describe in more detail what specifically you feel is
>unclear? The WG has discussed at length the need for being able to
>produce both UTC and TAI representations from the protocol; I was
>under the impression we had moved on from that discussion already.
>> 4.8 Security
>> - If we shy away from naming a security option (e.g. NTS) as
>required for everyone, we leave the door open for a situation where
>two implementations can only do unsecured communication (because they
>support different, mutually exclusive security options).
>
>(#3c) I disagree. The document clearly states the protocol must have
>certain security capabilities - how it gets them is left up to
>protocol design. If it's NTS or something else I see that as somewhat
>orthogonal to this document and I'd like to leave the door open to
>future agility.
>
>> - We don't have a strong opinion on what's best, but if we require
>security to be supported, we must specify a minimal supported set.
>
>Could you please clarify what must be supported exactly? I don't
>believe this document should cover cryptography primitives, only
>capabilities which I believe are described at sufficient depth to
>permit protocol design.
>> - "Downgrading attacks that could lead to an adversary disabling or
>removing encryption or authentication MUST NOT be possible in the
>design of the protocol." is a difficult requirement. Under the
>problem outlined above, it might be simply unfulfillable. Also, it
>leaves unclear what is forbidden (only downgrading to zero security,
>or any downgrading at all)
>
>It's implied any downgrading - as an attack wouldn't just be
>weakening for the sake of it. Thieves don't cut only half the lock
>and leave it. I could adjust the text to directly state this.
>> 5 Non-requirements
>> - This seems prone to misunderstanding: these are points that we as
>a WG have discussed and consented on not pursuing further; but it
>might sound like optional requirements?
>
>I'm not sure what is unclear here - those under the non-requirements
>are explicitly stated as out of scope, there is no text stating they
>are optional, and exist in the document to show that they have been
>considered as they were mentioned in previous discussion. Their
>inclusion in the document does not prevent them or other requirements
>not described being developed for NTPv5 in the future by the working
>group. Do you suggest this section be removed, or edited?
I guess it is just another example of where I expected the document to refer to WG consensus.
>> 5.1 Server Malfeasance Detection
>> - I find it problematic to cite a draft (!) and claim that it
>"already provides this capability"; Roughtime is IMO not mature
>enough to do this
>
>Do you propose it be removed, or something else?
This is also a minor issue to me, but yeah, that minor issue is twofold:
"Detection and reporting of server malfeasance should remain out of scope, as there are other documents in development that aim at this capability as a core functionality of the protocol."
Kristof Teichel
__________________________________________
Dr.-Ing. Kurt Kristof Teichel
Physikalisch-Technische Bundesanstalt (PTB)
Arbeitsgruppe 4.42 "Zeitübertragung"
Bundesallee 100
38116 Braunschweig (Germany)
Tel.: +49 531 592-4471
E-Mail: kristof.teichel@ptb.de
__________________________________________
- [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements Karen ODonoghue
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements David Venhoek
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements Miroslav Lichvar
- Re: [Ntp] [EXTERNAL] WGLC - draft-ietf-ntp-ntpv5-… Denis Reilly
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements kristof.teichel
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements James
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements James
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements kristof.teichel
- [Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-re… kristof.teichel
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements James
- [Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-re… kristof.teichel
- [Ntp] Fwd: Antwort: Re: WGLC - draft-ietf-ntp-ntp… Daniel Franke
- [Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-re… kristof.teichel
- Re: [Ntp] Fwd: Antwort: Re: WGLC - draft-ietf-ntp… Salz, Rich
- [Ntp] Antwort: Re: WGLC - draft-ietf-ntp-ntpv5-re… kristof.teichel
- Re: [Ntp] [EXT] Hard NO: Re: WGLC - draft-ietf-nt… Hal Murray
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… Miroslav Lichvar
- Re: [Ntp] [EXT] Re: Fwd: Antwort: Re: WGLC - draf… Windl, Ulrich
- Re: [Ntp] [EXT] Re: Fwd: Antwort: Re: WGLC - draf… Ira McDonald
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements Steven Sommars
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… Dave Hart
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… Harlan Stenn
- Re: [Ntp] [EXT] Hard NO: Re: WGLC - draft-ietf-nt… Windl, Ulrich
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements Steven Sommars
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… Miroslav Lichvar
- Re: [Ntp] [EXT] Re: Fwd: Antwort: Re: WGLC - draf… James
- Re: [Ntp] WGLC - draft-ietf-ntp-ntpv5-requirements James
- Re: [Ntp] [EXT] Antwort: Re: WGLC - draft-ietf-nt… Windl, Ulrich
- [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv5-re… Harlan Stenn
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… David Venhoek
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… Dave Hart
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… David Venhoek
- Re: [Ntp] Hard NO: Re: WGLC - draft-ietf-ntp-ntpv… David Venhoek