Re: [Ntp] New Version Notification for draft-gruessing-ntp-ntpv5-requirements-03.txt

Danny Mayer <mayer@pdmconsulting.net> Fri, 15 October 2021 19:32 UTC

Return-Path: <mayer@pdmconsulting.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D4F23A0A1A for <ntp@ietfa.amsl.com>; Fri, 15 Oct 2021 12:32:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fHMhTCGHmGc0 for <ntp@ietfa.amsl.com>; Fri, 15 Oct 2021 12:32:23 -0700 (PDT)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0349E3A0A0E for <ntp@ietf.org>; Fri, 15 Oct 2021 12:32:21 -0700 (PDT)
Received: from newusers-MBP.fios-router.home (pool-108-26-179-179.bstnma.fios.verizon.net [108.26.179.179]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4HWGcf2wVHzMNQF; Fri, 15 Oct 2021 19:32:18 +0000 (UTC)
To: James <james.ietf@gmail.com>
Cc: "Salz, Rich" <rsalz=40akamai.com@dmarc.ietf.org>, Doug Arnold <doug.arnold@meinberg-usa.com>, NTP WG <ntp@ietf.org>
References: <163386015957.12424.6997038478834885480@ietfa.amsl.com> <CAO+dDx=6baLhf9LwSMvR1F0ieuLO6NXmExYLDvcCF2tgchHs8w@mail.gmail.com> <DB8PR02MB5772AC97BFE2D7C1139EFDC0CFB89@DB8PR02MB5772.eurprd02.prod.outlook.com> <E469D9A7-7445-49D9-A8A2-82BA7BF1FA27@gmail.com> <1985d4ff-d4a9-5ca3-e1b8-3d5f9a2fcc4b@pdmconsulting.net> <05E3CA12-9828-4EF6-8C47-20A7D07788AA@akamai.com> <fda9f648-5f63-e33d-6604-42db3a83a073@pdmconsulting.net> <34450932-5AF7-4701-A0CA-ADC6FEDCFF25@gmail.com>
From: Danny Mayer <mayer@pdmconsulting.net>
Message-ID: <37260431-de8b-fd4f-f98c-4940ce0066d9@pdmconsulting.net>
Date: Fri, 15 Oct 2021 15:32:17 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0) Gecko/20100101 Thunderbird/78.14.0
MIME-Version: 1.0
In-Reply-To: <34450932-5AF7-4701-A0CA-ADC6FEDCFF25@gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/CS-fznT_IFYshf8P6B78hDag1LE>
Subject: Re: [Ntp] New Version Notification for draft-gruessing-ntp-ntpv5-requirements-03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Oct 2021 19:32:27 -0000

On 10/15/21 2:05 PM, James wrote:
> Danny,
> It turns out DNS does need confidentiality in addition to 
> authentication, because:
>
> * DNSSEC is not universal, and due to broken implementations and 
> operators who don’t bother implementing it fully not everything is 
> covered by it
> * It turns out there is a significant market for DNS query data as it 
> allows for passive tracking of individual users and systems. Some of 
> this is good (e.g. intrusion detection in corporate networks), but a 
> lot of it is bad (such as ISPs violating customer’s expectations of 
> privacy by reselling their data)
Yes, but that has to do with (mainly) browser requests for IP addresses 
and to keep that information from ISP's and others. It's not really a 
DNS issue per se.
> * AXFR/IXFR related traffic, which if observed in flight could expose 
> inner details of multi-horizon or “hidden master” deployment patterns, 
> or in insecure deployments cause hijacking of zones or records. RFC 
> 9103 addresses some of these risks by using DNS over TLS.
AXFR/IXFR doesn't use DOH and can definitely be encrypted or use TLS 
encapsulation.
>
> DNS information may be public, but one can’t know the data unless they 
> know what they are looking for. The TLDR Project[1] was a good example 
> of this, and it uncovered details on the DPRK’s public DNS[2] which 
> was previously not fully known. DNSSEC allowing for enumeration of 
> zones was never seen as a neutral or good feature, it is seen as a 
> security issue, which is where NSEC3 came about.
There's also a NSEC5 proposal though that went nowhere.
>
> Back to the topic of NTP, I could elaborate further on the threat 
> model in my draft to cover scenarios where confidentiality may be a 
> useful mitigation. However, as has been mentioned by Rich and others 
> in the past the overall trend for internet-facing protocols (which I 
> assume NTPv5 would be) is to provide confidentiality even if optional, 
> in part because of all the details RFC 7624 describes, amongst other 
> guidance we’ve received from the IESG and other reviews for protocols 
> of recent times.
>
> Perhaps you can elaborate why you think confidentiality in NTP is a 
> bad idea?
I want to know why confidentiality is a good idea. The complication of 
encrypting an NTP packet adds to the uncertainty of the departure of the 
packet, prevents hardware timestamping and a myriad of other measurement 
issues. The timestamps are not confidential and are only of momentary 
value. What are you trying to hide? When concentrating on the packet 
please identify what parts of the packet should not be exposed since the 
timestamps surely cannot be. If I'm wrong please tell me why I'm wrong 
and provide example use cases to support your theory. I see nothing in 
RFC7624 to indicate an area of concern where NTP is involved.

Danny