Re: [Ntp] [EXT] Re: I‑D Action: draft‑ietf‑ntp‑ntpv5‑requirements‑00.txt

Danny Mayer <mayer@pdmconsulting.net> Mon, 15 August 2022 19:15 UTC

Return-Path: <mayer@pdmconsulting.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 494EAC152571 for <ntp@ietfa.amsl.com>; Mon, 15 Aug 2022 12:15:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_TEMPERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zw_0bhdnufmv for <ntp@ietfa.amsl.com>; Mon, 15 Aug 2022 12:15:35 -0700 (PDT)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4902DC1524D6 for <ntp@ietf.org>; Mon, 15 Aug 2022 12:15:31 -0700 (PDT)
Received: from [192.168.1.156] (pool-108-26-202-2.bstnma.fios.verizon.net [108.26.202.2]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M63rv3Mv9zMNZQ; Mon, 15 Aug 2022 19:15:27 +0000 (UTC)
Message-ID: <31b11b04-5cc1-badb-a050-2e1dcf2d4a90@pdmconsulting.net>
Date: Mon, 15 Aug 2022 15:15:25 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: David Venhoek <david@venhoek.nl>, ntp@ietf.org
References: <165876285947.22203.11524063568909924568@ietfa.amsl.com> <CAPz_-SXK3aGA+dTLy5AtZzYfHykVKf9K4EVnwF2jMkebvkKUYg@mail.gmail.com> <CB90EBD2-18E2-4379-AC14-F006553A7D2A@gmail.com> <d7dd38af-3787-5e42-9f84-2d674a8c2d71@pdmconsulting.net> <62E796DC020000A10004BFCD@gwsmtp.uni-regensburg.de> <CAPz_-SX8iE0aaS8vyQF1oH4mcZ5K3OqT5kmjnWUd-CeB=SjGEA@mail.gmail.com>
From: Danny Mayer <mayer@pdmconsulting.net>
In-Reply-To: <CAPz_-SX8iE0aaS8vyQF1oH4mcZ5K3OqT5kmjnWUd-CeB=SjGEA@mail.gmail.com>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/EwpE6hU5c8awzC-rgU4I8TCPkfQ>
Subject: Re: [Ntp] [EXT] Re: I‑D Action: draft‑ietf‑ntp‑ntpv5‑requirements‑00.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 15 Aug 2022 19:15:40 -0000

On 8/12/22 10:26 AM, David Venhoek wrote:
> Given the comments on the refid and its uses and desires around it, I
> think it would be good to rework that section of the requirements
> document somewhat.
>
> As I can tell, there seem to be two desires here, each of which has
> different requirements. Perhaps we should reformulate (and even split)
> this section to better reflect the two desires here. If i have some
> time this weekend I will try to make a suggestion via the drafts
> github repo.
>
> Going into the nitty gritty for discussion right now, I see the
> following two parts to the future of refids:
>
> 1. A server provided identifier for logging and allow/deny listing
> I'm not a hundred percent sure on whether we should want this in
> NTPv5, but if we do, it seems weird to me to rule out something like
> an FQDN since those are basically the identity building blocks on the
> internet. If we want this name to be anything more than just something
> the server claims about itself and want any trust-based backing for
> it, FQDNs seem to me at least an option worth considering given the
> existing trust infrastructure around them.
This makes no sense. NTP is based on UDP which is both connectionless 
and stateless. There is no way to validate that something sent to you 
can be relied upon to deal with allow/deny listing. DDOS exploits take 
advantage of this to fake the from IP address. There's nothing to ensure 
that an identifier added can be trusted.
> 2. Loop detection
> Thinking about it, I think refids are unnecessary for loop detection,
Actually they ARE necessary. The problem has to do with the fact that 
packets can be sent out on different IP addresses and that includes 
broadcast and multicast ones.
> and although they do accelerate rejection of some connections faster,
> I think we can do with just the stratum mechanism for loop rejection.

Nope, the most reliable result may be the one you sent out to the server 
that's sending you it's own packet.


> In general though, I think it would be worthwhile to reconsider the
> way we require stratum to be calculated, especially in light of
> clients potentially using an average of more than 1 server as their
> reference. In such cases, I think rather than the current mechanism
> (appoint 1 as "the" upstream and add 1 to its stratum) we should at
> least consider specifying that the nodes stratum should be at least 1
> higher than the largest stratum of a server which it "used" (in the
> sense that it directly influenced steering, rather than just
> truth-finding) in synchronization. Similar updates should probably
> also be considered around path-length/error estimates included in the
> information send by an NTP server. Wording of both however is going to
> be somewhat tricky in light to the loosening (which we definitely
> should keep in my opinion) on algorithms.

That's what a server should be doing. It's always 1 higher than it's 
chosen server. I don't think that this is clear enough in RFC5905.

Danny