Re: [Ntp] New Version Notification for draft-gruessing-ntp-ntpv5-requirements-03.txt

James <james.ietf@gmail.com> Fri, 15 October 2021 18:05 UTC

Return-Path: <james.ietf@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 254D63A0971 for <ntp@ietfa.amsl.com>; Fri, 15 Oct 2021 11:05:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atMQ_W-f7Wux for <ntp@ietfa.amsl.com>; Fri, 15 Oct 2021 11:05:23 -0700 (PDT)
Received: from mail-ed1-x52b.google.com (mail-ed1-x52b.google.com [IPv6:2a00:1450:4864:20::52b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1C2983A096D for <ntp@ietf.org>; Fri, 15 Oct 2021 11:05:23 -0700 (PDT)
Received: by mail-ed1-x52b.google.com with SMTP id w14so41061327edv.11 for <ntp@ietf.org>; Fri, 15 Oct 2021 11:05:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=udWTqblCevn86awkCGMi41bX+SL2O0aS0WihhQ8ral4=; b=dG8zyNrJGcMk9RYrmHBDn3N3e7eCLAfwPnkaDw+T0EZKVB6nU6GP++/mHqd4Ri5JPo 6Vrhqw4BoXumsC2I65amRcwyAEAyWdVwenhcUWJt4jSyhDEekou7peL4l9wpAJNmeglZ Uvel8cTZQPiDv8j11UJnFATkVULJybmTQxle0RtG0uw5psINHsnrNjzfMrrFZmlFnZ+v sKxndwXFFqHvy8Ur3LfRrPPFEJCjNcqTlOu7rvnTKfXE4SG7iQCA7UpvD/29v32v41UJ 2AdpvHnAYfwSILtYe0NJyO72UzhfD/WRfzvtqyjCfnr+shdKXUcvy8fpDzgr8nSy1sLE BImQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=udWTqblCevn86awkCGMi41bX+SL2O0aS0WihhQ8ral4=; b=mtI0kOmUBEYJiYywSUgo4p3y3MPAk9VzKmr8livfzaNSkMO8P54OBgXKN6BmLsca8S YgsE9qdTnTUG+b9IyaXpqk72TNrTSskpUu2M/9tIniWSnuhop9Rp3mZ4L4TIn51yFK5i A18ObLbxcvBc/nTHstxfEV0IT2AZhrQteMW1/1q6Mzx2sAIeVSdwr2t6jgCf4Hj90tFc CC+vYvHSOgkRtsZ2GgaRIXqVDAE7Q5M9FwuH6NZ00X3wl+RpDLZLdZ/0hsbcS+rFfdHu TPvs0zgyvNPuDpNK+huSAbYlAoTKYGVr7tbR0GNXy6bF9n5ZUGcj2PXJOcDno+ExAa1O Xdyg==
X-Gm-Message-State: AOAM531iB7ALbqWCPcIPwVsXO6qV9HQOhsIEHvfaiUhtvfQR191ekhCj bGQPKin2EA72KO2CClbsI/4=
X-Google-Smtp-Source: ABdhPJzgRwKYbd9P+8z4zT6LAyEliGUhtIsDmSu2moXDfE3XW0ViqEWr3oNpEk47zJuJ/kCkFUNy2Q==
X-Received: by 2002:a50:becf:: with SMTP id e15mr19665010edk.114.1634321120945; Fri, 15 Oct 2021 11:05:20 -0700 (PDT)
Received: from smtpclient.apple ([2001:984:65b0:1:9d06:8bc7:9aa8:2605]) by smtp.gmail.com with ESMTPSA id f12sm4085330ejl.5.2021.10.15.11.05.20 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 15 Oct 2021 11:05:20 -0700 (PDT)
From: James <james.ietf@gmail.com>
Message-Id: <34450932-5AF7-4701-A0CA-ADC6FEDCFF25@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_5DD6B77A-3209-42AA-A8CC-B2AF88EC2658"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\))
Date: Fri, 15 Oct 2021 20:05:19 +0200
In-Reply-To: <fda9f648-5f63-e33d-6604-42db3a83a073@pdmconsulting.net>
Cc: "Salz, Rich" <rsalz=40akamai.com@dmarc.ietf.org>, Doug Arnold <doug.arnold@meinberg-usa.com>, NTP WG <ntp@ietf.org>
To: Danny Mayer <mayer@pdmconsulting.net>
References: <163386015957.12424.6997038478834885480@ietfa.amsl.com> <CAO+dDx=6baLhf9LwSMvR1F0ieuLO6NXmExYLDvcCF2tgchHs8w@mail.gmail.com> <DB8PR02MB5772AC97BFE2D7C1139EFDC0CFB89@DB8PR02MB5772.eurprd02.prod.outlook.com> <E469D9A7-7445-49D9-A8A2-82BA7BF1FA27@gmail.com> <1985d4ff-d4a9-5ca3-e1b8-3d5f9a2fcc4b@pdmconsulting.net> <05E3CA12-9828-4EF6-8C47-20A7D07788AA@akamai.com> <fda9f648-5f63-e33d-6604-42db3a83a073@pdmconsulting.net>
X-Mailer: Apple Mail (2.3654.120.0.1.13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/C4FRHutTQOIVcqKHf6o6Pha-v7E>
Subject: Re: [Ntp] New Version Notification for draft-gruessing-ntp-ntpv5-requirements-03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Oct 2021 18:05:28 -0000

Danny,
It turns out DNS does need confidentiality in addition to authentication, because:

* DNSSEC is not universal, and due to broken implementations and operators who don’t bother implementing it fully not everything is covered by it
* It turns out there is a significant market for DNS query data as it allows for passive tracking of individual users and systems. Some of this is good (e.g. intrusion detection in corporate networks), but a lot of it is bad (such as ISPs violating customer’s expectations of privacy by reselling their data)
* AXFR/IXFR related traffic, which if observed in flight could expose inner details of multi-horizon or “hidden master” deployment patterns, or in insecure deployments cause hijacking of zones or records. RFC 9103 addresses some of these risks by using DNS over TLS.

DNS information may be public, but one can’t know the data unless they know what they are looking for. The TLDR Project[1] was a good example of this, and it uncovered details on the DPRK’s public DNS[2] which was previously not fully known. DNSSEC allowing for enumeration of zones was never seen as a neutral or good feature, it is seen as a security issue, which is where NSEC3 came about.

Back to the topic of NTP, I could elaborate further on the threat model in my draft to cover scenarios where confidentiality may be a useful mitigation. However, as has been mentioned by Rich and others in the past the overall trend for internet-facing protocols (which I assume NTPv5 would be) is to provide confidentiality even if optional, in part because of all the details RFC 7624 describes, amongst other guidance we’ve received from the IESG and other reviews for protocols of recent times.

Perhaps you can elaborate why you think confidentiality in NTP is a bad idea?

- J

1: https://github.com/mandatoryprogrammer/TLDR <https://github.com/mandatoryprogrammer/TLDR>
2: https://github.com/mandatoryprogrammer/NorthKoreaDNSLeak <https://github.com/mandatoryprogrammer/NorthKoreaDNSLeak>

> On 15 Oct 2021, at 19:29, Danny Mayer <mayer@pdmconsulting.net> wrote:
> 
> 
> On 10/15/21 1:03 PM, Salz, Rich wrote:
>> ➢ Encryption needs to be off the table. It's not just a bad idea, it provides no benefits. Time is not a confidential matter. If you have some use cases for encryption, please state them.
>> 
>> I am not so sure it provides no benefits.  We used to think that DNS was a public repository and that there were no privacy concerns, and it turns out we were wrong.  Sure, time itself is not confidential -- anyone can buy a watch :) -- but the story around the meta-data for time services is not as clear.
>> 
> The reason to do encryption is to make the contents confidential so noone else can know what the contents are. There's nothing in the NTP packet that needs to be hidden from prying eyes. The DNS issue is again not a matter of confidentiality. As a former DNS Developer I can tell you that the issue resolved with DNSSEC was to prevent spoofing. The DNS packet is NOT encrypted, it just has content to prevent spoofing. The Kaminsky attack shows an example of that.
> 
> Danny
> 
>