[Ntp] Re: informal discussion of ptp security approach and mechanisms

Doug Arnold <doug.arnold@meinberg-usa.com> Mon, 08 July 2024 14:06 UTC

Return-Path: <doug.arnold@meinberg-usa.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21382C207970 for <ntp@ietfa.amsl.com>; Mon, 8 Jul 2024 07:06:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=meinberg-usa.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 18DSaGD93nb0 for <ntp@ietfa.amsl.com>; Mon, 8 Jul 2024 07:06:50 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2132.outbound.protection.outlook.com [40.107.21.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 199BFC20795E for <ntp@ietf.org>; Mon, 8 Jul 2024 07:06:48 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Nr6PNg6BIL7EK0ZkUAWPnsnjqTOuwiBawH6KwsyXP4DYPItVCVAznMu1N2riASfMco2KrwSUMLH/S42JD53f1jSEljIOHaGkD7fxC3eebXgEstE3JGIX5SVYtcF6QKEpdIh372TG5LYnGURuNBwSdGDSW2YnZKxZA8g8v1dNKOwMhaZJCjlrfWagXAaQviiXRO0u3A8CpUPWqRvaxkfK8LI8NQYwpPrMJ9j1DK7e4eAGFNkXNtjV+lU/HZUag2NNqEgsCcm0HWasGLUQgrmmAGtVyjHLLV+fuWnDgTwq+3BmRBG8w1P89iyUmAWv5lnh2raXNDWZxnYj8izEat3SMg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lnphFfR9yHoxf3FdT1548tIeB8pt9rc11f2NAcGIyXY=; b=PdbiRcR9TO/nLcYZ4RDkCw+Aa61PhHMLQ8nZmkun9GhVkPDUk25LM6H84tp5fu5P8HMwMbHICiN72J5qy0bN8Aw7WfYtvRPvW/iFObuQ9dT20SyRnPflVvr1M7yg1BW2qSCYrESJx1qJQ18jy19+FtAc4B9Ok92yF2Bz4Yka4Fr3hSQhw/G4G3liT7FLWgwGRHNUPKahudlVIfvONyULk2td/l+D1aUzPAA0ZYZzQTX7RY0FF7JddSIwFwmLXN65qHoHBaWYvXuG/yfKw3V8kZv5XEJvF5bk9Hakhbnvd3XyZdXlcF3C0QktwN7b9G5NINRgdDdPpan+yLNd7lrGFQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=meinberg-usa.com; dmarc=pass action=none header.from=meinberg-usa.com; dkim=pass header.d=meinberg-usa.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meinberg-usa.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lnphFfR9yHoxf3FdT1548tIeB8pt9rc11f2NAcGIyXY=; b=BMW94AWubASK5pp73nqLDpCTmG9+mECAcD1nkPOLgByaauQP7+Eb5ILwlxNiAOXHORvjp1c7EC9x+HrhqygrOsOWH3zSDjBAqNHQqsN2D2Hxc1MJ5k/1HfsRB7KcC4JIrItZ1lAUnJaIrc8fe4ry8kkAf5nKbVfcIv7WRC/2HQdp+KGTMRZID0XEkJL1XC2637XdooeZarT7HH4iHBxM5Dwa1EwAsp77Onl18vfBUtm0OwnC2D1oQ5ntxCd8PiX42+1686FDGoSxAEz8VQDEOvkhQRdFQ3EAgSvxO1bfd+9ehXUYz+0N4mOer/1ci7ipDgdZoAbjeSxor+GxTtHHIw==
Received: from DB8PR02MB5772.eurprd02.prod.outlook.com (2603:10a6:10:11e::11) by AM9PR02MB7058.eurprd02.prod.outlook.com (2603:10a6:20b:26f::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.35; Mon, 8 Jul 2024 14:06:45 +0000
Received: from DB8PR02MB5772.eurprd02.prod.outlook.com ([fe80::c808:e8b0:b37f:aab]) by DB8PR02MB5772.eurprd02.prod.outlook.com ([fe80::c808:e8b0:b37f:aab%7]) with mapi id 15.20.7741.033; Mon, 8 Jul 2024 14:06:45 +0000
From: Doug Arnold <doug.arnold@meinberg-usa.com>
To: Hal Murray <halmurray+ietf@sonic.net>, "ntp@ietf.org" <ntp@ietf.org>
Thread-Topic: [Ntp] Re: informal discussion of ptp security approach and mechanisms
Thread-Index: AQHa0K7nhlaUwfL/hEyuGajlmc6CWLHs2hdI
Date: Mon, 08 Jul 2024 14:06:45 +0000
Message-ID: <DB8PR02MB577235830702B7C95C21CBBECFDA2@DB8PR02MB5772.eurprd02.prod.outlook.com>
References: <20240707204722.7BE6162003D@107-137-68-211.lightspeed.sntcca.sbcglobal.net>
In-Reply-To: <20240707204722.7BE6162003D@107-137-68-211.lightspeed.sntcca.sbcglobal.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=meinberg-usa.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: DB8PR02MB5772:EE_|AM9PR02MB7058:EE_
x-ms-office365-filtering-correlation-id: a75d853d-52ae-4eaa-3044-08dc9f57333e
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|4022899009|38070700018;
x-microsoft-antispam-message-info: dKDaazmMngTsqo1FrS+pj8LEe2405R8KFi3dZfwP5sOFGLk5SctCHQywch23xpzgfNFbSR6XUqpdX01j8PUsk9Uqh66UfccevOURNeRGuJJPQH0s0Xcj8aeoEWwdeHcl1nHk9WQLGPpEVg6sjUZp0BI25K/xxe5lr0amD+1uA+95hS8VZb79Im/VYkcH3KLOk6KcfII734zIChTUXgIfGCD+axB/ZJUWACiKzKk9QxeqyGA5x+Vhv77mY6DXtAsvlqMuUhuqZRAVnw/qTi8kGxaws9tx56SbROE+PgnT6ksoVyI0RrKYrJMINPfQMXEv+rTBOyk1LY/oj4wZ7oE2rLPMONq3bPZUJmujBe7RrJeB3OhtQTD3tT3k6snxX/QDv/YH6fF0+/V4kwpX63zgldrNE//Uq29evJwL//gEMhhrWktIeeFElAIMP90yNWjnj7/Yh63JoFA7uJeMPesqXP+CdJVKaGHGzDWiI3kFn/k1jBRPMVb5D9/HFyCVjtSuahGSUhlGH69iiU1FnLPHrPDYTP1XikSfDK1+lmkdcT1eNHE8MP4z0P9AYXnZC5cb9gTJNQfiYeiIrF4U9YORRRg90/ZGM0335E3tQHWK3iM0CIhEK3oU0HDptSPeY9CaRxCLjk7D/OiDkcRCYDAASTTcEXhEZ51fooImbWR7gE4fNYteXtjfgC6K2SKDuKt0FJ9TWU3I8ye8vQWmrmzS2d3/1X8+VL2hhe8AhHpaBnkWsYVkty/b3ioEkS+tKeMhINIgH4UjQhpOZ1c2pZQKoT2X10k3/3GHfVvE2P07GxhBH6xaMvzFx70awzhYTc+Bi0ITZZCIw5QhYKKmHZ7yfoxjJNDIJS2KOyobbBlsJxxbpKHIBfe79d1D7fyHWQQZbHfGPlHYaphf8wLZydTANlKxq2Ju6BGyW+ljk26fHpUFISiPGN8Pif10isMKnyib1m+eJj83lW04RsUdvjsVo1SsGTZQBP6dPK/UJO80m1sdU4VMDa5Bg6NovrvXEh9/RiVOFKuHjJ4SxO1DoiCveMY9kRgi5Kpd8voQD5Z3bPMRzXhWh+lw+iVVMCnLwvoJnX0aQVtZDahiL+evuazxCSXYdLXyHch9VftPt/igFkqsu+9jV2N+8Uye3nPoLQO5ouWsSmLgRxSy+B+igFcli4tCPB+UCX/jQygwbpEO0iNhLNQO3X9CEaa3ZXN1Tvzf9jHvyaw5K1BFXJWU1VStoFCaqoccMEbwle3YPwvYbYaWIY71xXjrY1IlznG/tk5DcgAo9gXLboGorRaUuNiIYz7mvXfJZPM5J/x0BMu3alGqmEYSxm3xWt7XwstGQZoyIWzsMvBZfkeLjAuuJwxRL26c0wS0UDnCgvwH4/wbRFyr/BqEmfSD952vMGgOp0FO5lXCxfo0po9BilhE8rKICA==
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DB8PR02MB5772.eurprd02.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(4022899009)(38070700018);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_DB8PR02MB577235830702B7C95C21CBBECFDA2DB8PR02MB5772eurp_"
MIME-Version: 1.0
X-OriginatorOrg: meinberg-usa.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DB8PR02MB5772.eurprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a75d853d-52ae-4eaa-3044-08dc9f57333e
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jul 2024 14:06:45.0256 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: d59904cd-769f-4368-8bd0-f5f435893a38
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: R8zXGJH1R/Q8jyBhDuJX/ViBPYQbPr5edH1mk0QbO0zeUhGyv7R3IbnbBzi9pfETommzEh9mPWKOTtXXhy7zScmbuOuoGYK8N4uU7vv1Yms=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR02MB7058
Message-ID-Hash: OEHQZ3LQIRUK5AAOS2WPCCTU5ACN2C23
X-Message-ID-Hash: OEHQZ3LQIRUK5AAOS2WPCCTU5ACN2C23
X-MailFrom: doug.arnold@meinberg-usa.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ntp.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc4
Precedence: list
Subject: [Ntp] Re: informal discussion of ptp security approach and mechanisms
List-Id: Network Time Protocol <ntp.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/Eq_6t54fywu0q103V0ddJHQo4f4>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Owner: <mailto:ntp-owner@ietf.org>
List-Post: <mailto:ntp@ietf.org>
List-Subscribe: <mailto:ntp-join@ietf.org>
List-Unsubscribe: <mailto:ntp-leave@ietf.org>

Security is hard
Multicast security is really hard
PTP security with on-path support is pretty much impossible

But since much of the worlds critical infrastructure depends on PTP to work, some smart people need to figure something out to make PTP less vulnerable.

Here are some things that people have discussed:

  *
Leave the correction field out of the ICV and check it with heuristics (As proposed in NTP over PTP)
  *
Use a group key scheme where members of the group are authenticated on check in (Like GDOI or NTS for PTP)
  *
Get time from multiple timeTransmitters with as much path diversity as possible (like NTP does)
  *
Have Ethernet switches refuse to grant access to the PTP multicast addresses unless a device can produce a digital certificate that is on the authorized list (See IEEE 802.1X)

The IEEE 1588 working group purposely came to the NTP working group looking for help.  Since NTP works over the public internet you folks had to solve security already.  Also, in general there is more security expertise in the IETF membership than elsewhere.


  *
Doug

________________________________
From: Hal Murray <halmurray+ietf@sonic.net>
Sent: Sunday, July 7, 2024 4:47 PM
To: ntp@ietf.org <ntp@ietf.org>
Cc: Hal Murray <halmurray+ietf@sonic.net>
Subject: [Ntp] Re: informal discussion of ptp security approach and mechanisms


I've missed a key step in the big picture.

The basic idea in PTP is to modify a packet in flight.
One goal of security is to detect modified packets.

Those seem like conflicting ideas.  So what does "security" mean in the
context of PTP?


--
These are my opinions.  I hate spam.



_______________________________________________
ntp mailing list -- ntp@ietf.org
To unsubscribe send an email to ntp-leave@ietf.org