Re: [Ntp] Roughtime draft

Marcus Dansarie <marcus@dansarie.se> Sun, 10 February 2019 21:07 UTC

Return-Path: <marcus.dansarie.nilsson@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 57A9C1279E6 for <ntp@ietfa.amsl.com>; Sun, 10 Feb 2019 13:07:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.881
X-Spam-Level:
X-Spam-Status: No, score=-1.881 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.018, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yhlg0lfb33L0 for <ntp@ietfa.amsl.com>; Sun, 10 Feb 2019 13:07:39 -0800 (PST)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E3091277D2 for <ntp@ietf.org>; Sun, 10 Feb 2019 13:07:39 -0800 (PST)
Received: by mail-lj1-x231.google.com with SMTP id v12-v6so2426879ljc.6 for <ntp@ietf.org>; Sun, 10 Feb 2019 13:07:39 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to; bh=asBLAiVfjRkjI9dQSp6/MxyrkFVSpELUNmQaKeSGMEA=; b=LkcyMITex2eSm5LmL1WMLS8Je72ugZffdMnizCjGEZGdggqytr+x+gzEWXVkDy8ZmM gkSwjnCGbFhNnygiX5AUb28Na7QczW9RvFu5GnH8QuUpOe5aoEkfagvaJVxkpkMrU1Yj 8ced1wBKxFR2X2KZwfBMQ5/1rEJ2iedUx+hSRlaWmDhu5qY7qev01iTxluH5L8fy3BUp OMTu0aJkiOl88GijuIVlZhzPaW7dc1hE2Rq/lZRBBfWS9rzT3CmIPyQOW2TCBE+2rArn iYyg912mKbVDNa03zDBva4u10AAIGDETrUNv3XpTlcJwwA7zGnn5PRj++dOm6m0xwW61 q7Ng==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:references:from:openpgp :autocrypt:message-id:date:user-agent:mime-version:in-reply-to; bh=asBLAiVfjRkjI9dQSp6/MxyrkFVSpELUNmQaKeSGMEA=; b=a65UDA5SpQTYgaIBxYR36NKBNwXDy7+XVuUJKUosnAUgH24dL1ZaOfG4FZy4G1gNEs 3q67KWsJwUXNUI2M43G5bCPD5MSpvssKxJjnCMkSYWPhnWiJJbbYmORoymvX3l1kR3JZ vPKfAJDE7b9VrtDsyJdgUbrpFz7prPcvhhF4kjsa35Dxa6JI6c2HR56wZb/kD8b9cLt6 nAN/p1cyjwUJWTNE2xu+84whef58CxJG27yv74Lt1OAIrtg0NtlBo/8H2eqQPQpj8L3C OwZnuPjydAIGZ26YxW3f+irDp7r6Mo7f1qDwHzjPRJc5ZlhAYdnYrzz4heIdXqPBDYVJ ElOA==
X-Gm-Message-State: AHQUAubXOJODgW23OlrbcnFlcS5JQiSiLxHZyA/hA3ratm6Oxg87z9/s tj44RD2y+vI1oQDyH6bgK2SY4ntE
X-Google-Smtp-Source: AHgI3IbyPzLIyvyKiA/USsjjIpLMGiyHXfqBfQK9ded0eJdvzJFPijewwAS6qZvR/db9PqaFcHhs7Q==
X-Received: by 2002:a2e:96c9:: with SMTP id d9-v6mr4886659ljj.105.1549832856626; Sun, 10 Feb 2019 13:07:36 -0800 (PST)
Received: from [10.0.0.126] ([185.40.184.26]) by smtp.gmail.com with ESMTPSA id c22sm2012750lfi.27.2019.02.10.13.07.35 for <ntp@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 10 Feb 2019 13:07:35 -0800 (PST)
Sender: Marcus Dansarie <marcus.dansarie.nilsson@gmail.com>
To: ntp@ietf.org
References: <CAMbs7ks7sVkN+o4mqqcGU=c0gBZw0SJDrtBHqmnOG1NR4+tBXg@mail.gmail.com>
From: Marcus Dansarie <marcus@dansarie.se>
Openpgp: preference=signencrypt
Autocrypt: addr=marcus@dansarie.se; prefer-encrypt=mutual; keydata= mQINBFawEn4BEAC8YukDy8f3eczlE8WAcuctrjsNltPCLZDzcj3vBmiayXlXuPULOopqeuw4 +oaZqj4KqvdFBA1mzvwPll7IHePuwAoJYJr48IbIXc9MRjtLoFtd0KnhiVPUS8F2cmfzSJ8E FEv92sz6UT8/tlLEu6sNqr6/caYUivspuW5wf4f6nkSE+6rao9Nx9X03r289IPNBSZv+Y/Ym jWHDPpbT8WLUJZ+A8RsW/1oza609oAzqTkclmnRzip8wZZWNg3Q55P7onBmTIOrEz13My9r5 DWCMHyxXgFL1RJ9YW0t4yRkRm+HvOn3Vesk3m8CCGA6esHV0IPZmBOxJr3l+UQYuDiTgFufr WMpu5MvlyKGHS4fNd505DyyJY2G6eQLLrOq3nZy4qoZSL42TMxzYglexg+H6P/YsIIShk5Ch h/hNphXjrElDWhbGT5JiRWIivgSj/gq5QVBbDLR3b25n9PA0byGemfcEHLkii6EKyH7GW6v9 sgmvCmPfEfppYcOP2g9Jdt8RPitx0UBjoCzWAn0Py0NvlFDyz0FQhWDPig3yo1CG5ljb686v VBwcHJthczUV0rIyVzfmnikIb9ZjydHSX3fFwLz1IcIIX+INS58qA0SDqOoyP2WTYGZCDPVw GMMh+wMtAL2MICTr6vybFWB58m4PsI1j8Ri+AQiEkxyJauI2WQARAQABtCRNYXJjdXMgRGFu c2FyaWUgPG1hcmN1c0BkYW5zYXJpZS5zZT6JAlwEEwEIAEYCGwMCHgECF4ACGQEJCwkNCAwH CwoEBhUKCQgLAgUWAwIBABYhBBfkVFb0H62SH33Csy9j5/6tpPBjBQJcLN6RBQkHXf+TAAoJ EC9j5/6tpPBjZNoQAI87t6fNeEDUe3mVxvhHbh0IQ3NTv5555HstmNA6ZKYeUhFIRFGGxo1D a93viLr59dL58NR43O4MA6IJTsOdCxnZfGMLRs7yHGylnilJEh9OwFHEJp0GprJ2RqfBGJsQ 0qQu90ptGhNWHeN1nEVPYg6tyTz6jFG+YuvHzIZjpCFY0xG+J92gncTDG8082kkp/fxSvKGr 6nxiH9lOxItJsUjRF3fUsmr8QERKfaYkrHaqEM05q0zlQu+ofwmq8oHk2Mlx+Earb0KgGWqM 85l8+uVnM/DKeD6qH8zAaOQImcyEn7KNQuHR+FELPRFFJ5BkSrJXat8P4ViC4Md0lF3X3sm9 nxztGbVD4v9M50ci7hosVsiqslU/nMv59f3NPATR+sOZrq3K5rSUGeVbF3+3ZT3fF4FfE7Gl ldtS8D4Lq8MYbfuFD4JnhqLQf9nuOeBH2qcJf6M6R5yi+NwEF7w1xGWYfI+ifNRlPl5FCJDj ft3JFxswKMpobyp2Amo1oman7kORTZ+dnQ9JNLZSbqSZRZ7CQt30exO1jgW0H0oYKVlZ3p3Q VqVC4BA5Ap7Pc6Da7LlgJnF6yfy1ODFllYBIT4kLOL/99W9CsKinaa6pJAjfs+x1QzzrR0ji ucHinLTeZ4JYDtFxXAEkQ2tuxaouoz+cLwrOwTepiBOiUtYnAg8tuQINBFawEqwBEAClJOj1 zOQTMRGzLK/08tEdwR4EwBDiWNci0JtjT59xtJdlGujuf/9wkt9hRIiALqt8U0vHwCzmxVTP Eueewv40WOraJzzDv6OBXJZMeF+IN1/CGrZcn8rLG9J1CyyVf+gCxUUXmpQDlE91iYMB4ifj dTTTizRnVYOQh54TV0yyiL2bn+ZdL8NYNpUbpoG2vppltt0NXv9ib9WPug9Q8Sx33CkkCj3F HJLHeHqo6AkFTpBdSn6/Ezs+ZHpuhNCHtrZyiJOi2YZ8EzpuxDwVjHLh8iXu0amlXSGP5wA7 MpNEtomhGw3bUr3aBcenfS4u/RE3V/y+vXae33LtVmaH7sli0SmrP8iUxkks2qjtS6W2a/qF xlHK/FXBChNIG0uRROvDlIudg6UHzQlK4mBdraGz4etfDpsNAX0x5ssxBTaFrJlZz935GPLR sg4o5f+FYcQrIZGisfCmiH8rdF1bkz450/OyfzS7lTCoxeizOnlamVwUCTfrWah/l8BXgP/i Y6KlbGpfr7aVYvA5e7fPe7uRqzPsxq7pL72r3p/TkNuPtJ7cbShN99p7v/v38STSJ4jbzy2W LMBFw5dJI73XtSGU2g/viZgVfl4Tro4XeYMF/FmRDiYcd+GpuDoB+g+NJYpGRGnr4+GgWl9U YCnN1TE9LSpvehvvKMvGqi0U1ENOUwARAQABiQRbBBgBCAAmAhsCFiEEF+RUVvQfrZIffcKz L2Pn/q2k8GMFAlws3qsFCQdd/38CKcFdIAQZAQgABgUCVrASrAAKCRDBCAAOw+Eh5rtYD/wN eZOov+0rwhszfD+IY9fI4qFUjuiKWR06fJ60HV7cStkDW6WtrF+NkUAwH5G0yrA+izyI9wtR 4r5OW5ruPWTRbHxOmsLfRnqh4dKU6uCvtoL+LNzAMyPORiZkzomOaKAPdtiVgECVupLsApDl 4tI2hpMYKmeTVuessXa83oGOi8uQGK/M57Koz20KPfLltJBsCcOwofCUdbmaPOlN/DspOaIe LWzN7qb3pzAuUltBCvVI3VRgqvfh6JSiGyaSUfjghfbtz0uAlZ4wSfHX2+Iw+1/9mlElZjkC y6QgxCb1vMqGSw5u596aGVm7m2zVGLn4/xhpFNbxHUwWre/AAMtJR5ASK3cq2au1U2rOja3f rRfzMuBqTrQGb+OcCaesaOssd7t+RmDKfv0u40z6ls9Mzav+BCXzfOnb3HNAgJE5C/xApTsd xhn5BZoxHy8N2Pc0emWe6JI5UDPlKpuwH6JDKrLaoHhE7Gy2U6iinQcgI5IEEa8wmwoWfkjU 5phTbZVHJ+yTOeZWcbJtyFIX18fbzyrZWguo1EWHubv33KqbiJ6klpfg5chwKXWZIlLmbivp Dv0KRybk5GB+X83OpeAH9dKT3kvcu6midppjFzakSIiaoSJDS9jcqQYEiRG71lnD7QdCoqjb fHZh8HXGYSbenDzisWIRouGsimOyeSaX6QkQL2Pn/q2k8GOq8g/+PAcag2kmEQeJIVEtVCA3 e+/v+9XTi/7X7fZ247gAHbbaZKavRMFmgVsJNq6riC4HoetUWwMWJ2A/buSVMVJwAd5pWXAq WkOPWgv60FN92yfdUPjXXhLMXhntCLaRbNmKw0gETFLlUGXbRHyiO02EbJziI+vOr3R3AYa/ JEvsCHKX6TUm/HerBmzTUOi/igtd/H7B4EYcO5bZLKSJ8RZT5hKwOpVIYOdvBWZx2+MTG++A w6mDCgpIRseWgsyrkfsKkf+xQw0JewsFMyW5z+swV5/SCrhzexRIh1Jr5KBQ7FI7WgO5l46o EKtCmBjDSckdlBg5wfpPHK4s3k3FreX/tPqrzwTaBY9NIyzLGE2KFgr5lTWOr4P5xb37CNg4 hCzSJStvrlR/MscUmjaYR+dHCwzNr5tkBDSIqBKw6THWV+i0g3Vo41FF06Eg8dnW0yMX5Vfp zw9YYFsTV+WbKBTRwNA6OsAkkD7zMU0KzL3+i33uzgo+CffBYJs12yABIWXtNWlXiJpqePyh /6PTEfYMUE7dDr8qlEt23AoGs3Eme+OgY/Y5Yv03jcINp98/qnXnnqf9ghpVavajVwOIQui5 CMxWUkDweNyEYJA4jaKkov5/iwssNosBSF007b4loCXLv45iz8jkQwYHUwzH86W6Gk13/bdt v0ksRjKe291ygQm5Ag0EVrASywEQAMscigyDy6txQ/cUE8P+S9zMPNbsTSqa3iyj0SREswxm JsrUou+yOt/Y4UxGX+JLc/zjI1+frWE33CNmucYMtrZSrxgQDp+Wp8Ak7UNQlBtRIjdcPqmA EFzgG9OP7If7MJZMeWVd47ybIYUKohuTdFgwJSF80f+DGLLjIchyVZbvyZWSQKIAxfavmZr1 CNEVYXyrL752rLVB+KnQgJaFqHFPp6cO/Y20ViF9QsLRtlref1VrxtdPuILhEKMmmc+ZRsDh J0V8Mi5q8pWcYWrz+JiVRyA1ULAhg6C2ypj1cFNnQyN22XptXbz687bqZQxar5xyAAV4D6i/ 8q1kNgSsbDq+XkWuGjS9kmvLGM9kGARNhMFNguJSgSfqZExPAJhCZ4hVboTKFoRR10482rlO yj0Va0GbmpGqftjNodA4mjpBi52pNymUF+s6eTk13L9DOOJ8d0+2Qd6e4uTeNXJhNW6g2l7b 5dt/bbHMla7hgqRKUtTqQRR2JCpP3vF4sHWnXYdEcJSACarBcxbfdwZBnF9Nwv7GiNTEEg7O +8qwlj16LTB8oNWjOwAHiqg0xQlL8JTz2rkX0gUIW1Hy9A6b6UikViRbmpHXg0s7364Xtxji mkKD8DVnC5NJDiwZztqG2iW7kxJnfA+eAClKEh+niZo5NpjWNUfhjUXM5DNVHtchABEBAAGJ AjwEGAEIACYCGwwWIQQX5FRW9B+tkh99wrMvY+f+raTwYwUCXCzeqwUJB13/YAAKCRAvY+f+ raTwY6oaD/9Q1RhI/RNI0TmS60ih7gTZ1wvWbU24qGHZ1Q5kgriS5C59IWDkVlOCx2qQVwJO eGBrUHDhEuL2AuAF46Rmh+tIFMqij8Orz8zebSydM8aBtSPua2QpAta/IJS/5jvGN0aKbim8 MpD9oCHFp7N+37p7e5jrpLHz3qh5cDau+fFDUzS04gtcgkJb3wXg0MhgoZF/KU3JSq0Xs0Ni ioljOHDgOddGzO7Dd2KbCW2vtzo7m50yrLHI77hsocnkqrIcIn6TeYtH7K1aksEI0KC2Sg0b ome7eO8jCziXZO73iwq9hflXAiZp9CM2HWlb7e2zXe8vChJorEf+9w3t/jyvQzCtOf12jUM1 xr99DODBAEtJ0/tUfSsGvfETmAhYD2tjRmVwzB7jRq6U4bc5jtcYEL5YKEWBIvJDVvzE3iu/ HHjc83bIIyqxeYyT3uClTWPVP5OEWBxGUas7u3hlxxmSzGjpXUDBZyoeC+Q6Q3WUp6zOSg+/ yVwD/KBQQ/Sy6vOfvgh6PmsP1D5xCZSl6UWnxSi8lTtAcjUjHyG1qCudR/pmDv0OL5Ul8PeF 87DBMz4Y0our+MslzlvhrmI90XcKAyHrukdnanS+gle61a44uFwtUGPTvCtSW4AQLR1uixc8 qaHsQNmXpQQOIt6nudcOCisXa1c6P/WU8I94u9BmCjTWRQ==
Message-ID: <abe14d52-3f6d-2d91-fa5f-fe99f9742c69@dansarie.se>
Date: Sun, 10 Feb 2019 22:07:26 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <CAMbs7ks7sVkN+o4mqqcGU=c0gBZw0SJDrtBHqmnOG1NR4+tBXg@mail.gmail.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="QTGqwYg5AeTNgn4Ys6TFfPfsdNbkkx3Lf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/BSYmaFGoEYHNECg2Mc2qgjzQZh4>
Subject: Re: [Ntp] Roughtime draft
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 10 Feb 2019 21:07:43 -0000

Hi!

I've heard about Roughtime before and have had it described to me, but
this is the first time I have actually read a specification. After
reading through the draft, I made a quick client implementation in
Python which is available on Github: https://github.com/dansarie/pyroughtime

Here's a couple of comments and suggestions based on my first impressions:

First of all, I like how simple and straightforward the protocol is. It
should be possible to implement even on small platforms. I also note
that it is possible to create a very small client implementation
entirely without any cryptographic functions. (Though it's not a good
idea to do so other than in very special circumstances.) The
amortization of the signatures over a (possibly) large number of
requests is a nice idea.

In Section 1, the draft says that "newer protocols like [NTS] fail to
ensure that the servers behave correctly." This is technically true,
because it is not a design goal of NTS. When using NTS, server
misbehavior is detected by the same means as in standard NTP. All but
the simplest NTP implementations have the capability to detect rogue
time servers and Chronos represents the state-of-the-art in doing so.
That said, I don't dispute the motivation or need for Roughtime.

A couple of nits in Section 3:
* "The response inculdes" should be "The response includes"
* "used to indicate the servers certainty" should be "used to indicate
the server's certainty"
* "response so that its needed to" should be "response so that it's
needed to"
* "proof of any servers misbehavior" should be "proof of any server's
misbehavior"

The abbreviations uint32 and uint64 are used a number of times without
explanation. While their meanings should be obvious to any experienced
programmer, they should be explained. "Unsigned 32-bit integer in
little-endian format" should suffice.

The message format was a bit confusing at first. A figure in Section 4
would have made the text easier to understand.

While Section 4 is very clear on how uint32s are converted to and from
byte strings, the same is not true for longer byte strings. I was a bit
confused about how to parse longer fields, such as public keys and
signatures, and about how pass the signed tags to the verification function.

Section 4 contains the phrase "Exempli gratia". Please change this to
"For example," to improve readability.

Section 5.1 states that request packets must be at least 1024 bytes. I
assume the reason for this requirement is to prevent amplification
attacks. If so, this should be stated explicitly in either section 5.1
or in the security considerations. Also, there should be a requirement
that servers MUST ignore request packets that are shorter than 1024 bytes.

The PAD tag key is encoded as PAD\xff, while the SIG tag key is encoded
as SIG\x00. For consistency, this should be changed so that both are
terminated with \x00. Additionally, terminating the tag keys with the
NULL character will make displaying them easier on many platforms.

Section 5.2 is hard to read. My suggestion is to give each tag its own
subsection. For example, the one on SREP could read:
"SREP is a parent tag in Roughtime format. It contains the ROOT, MIDP,
and RADI tags."

Nit: The first sentence in Section 5.2 is comma spliced.

In Section 5.2.1, the text "a Merkle tree using SHA512 as described when
we reach the PATH and INDX blocks" should be changed to "a Merkle tree
as described in Section 5.2.3" (or whichever number the description will
be in).

I can't find the format of RADI in the draft. It appears to be uint32.

It appears that there can be up to 32 members in the PATH array, but
this limit is not stated anywhere. With that many members, the PATH
array alone will be 2048 bytes in size. This could enable amplification
attacks and must be addressed. Furthermore, the path MTU on the public
Internet is normally 1500 bytes, which would require packet fragmentation.

Here's a tag tree with the tags' sizes in bytes:
[Header]  5*8 = 40 bytes
SREP      3*8 = 24 bytes
   * ROOT       64 bytes
   * MIDP        8 bytes
   * RADI        4 bytes
SIG             64 bytes
CERT      2*8 = 16 bytes
   * DELE 3*8 = 24 bytes
      - MINT     8 bytes
      - MAXT     8 bytes
      - PUBK    32 bytes
   * SIG        64 bytes
INDX             4 bytes
PATH          n*64 bytes

Except for the PATH tag, the sizes of the tags in a Roughtime reply are
fixed. Thus, with zero PATH members the minimum message size is 360
bytes. With PATH size (n) equal to 32, the maximum message size is 2408
bytes. The message size could be contained within 1024 bytes by limiting
n to 10. I haven't studied the Merkle tree structure in detail, so I
don't know if that's possible or what effects it would have.

Section 5.2.3 should be split into three sections: two describing the
INDX and PATH formats and one describing the Merkle tree data structure
and how the SREP ROOT is verified.

Section 5.3 is very clear and easy to understand.

I agree with Daniel Franke re Section 6.

Is the purpose of the JSON format mentioned in Section 7 to exchange
proofs of server cheating?

I don't understand the purpose of the grease described in Section 8.

The servers' public keys in Section 9 should all be in the same format
to simplify implementations.

The key for roughtime.int08h.com has been truncated. The correct key in
base64 format seems to be AW5uAoTSTDfG5NfY1bTh08GUnOqlRb+HVhbJ3ODJvsE=.

Nit: "hexidecimal" in Section 9 should be "hexadecimal".

Section 11 should include a request to IANA for a UDP port assignment.

Section 11 should include a request to IANA for a new registry for
Roughtime tag keys. Each assignment could include: the tag name (four
bytes), whether it is a parent or leaf tag, the data format/stride, and
a reference (i.e. RFC and section).

Roughtime is, like all other network time protocols, vulnerable to delay
and replay attacks by adversaries that control all or many of the
network paths to the client. This should be elaborated on in the
security considerations.

I haven't gone through the list of references in detail, but it seems to
me that some of them should be normative instead of informative.

Thank you for submitting this draft. I support its adoption by the
working group.

I hope any of this was helpful...

Kind regards,
Marcus Dansarie



On 2019-02-08 23:11, Aanchal Malhotra wrote:
> Hi All,
> 
> We have put together a draft for Roughtime. We encourage folks here to
> have a look at the draft and see if they think that there is a value in
> adopting/implementing it and would be interested to do so.
> 
>  https://tools.ietf.org/html/draft-roughtime-aanchal-00
> 
> Best,
> Aanchal.
> 
> 
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org
> https://www.ietf.org/mailman/listinfo/ntp
>