Re: [Ntp] Antw: Follow-up to yesterday's mic comment about PTP security

kristof.teichel@ptb.de Wed, 24 July 2019 07:04 UTC

Return-Path: <kristof.teichel@ptb.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04F65120332; Wed, 24 Jul 2019 00:04:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D1J-eBTwrIeW; Wed, 24 Jul 2019 00:04:14 -0700 (PDT)
Received: from mx1.bs.ptb.de (mx1.bs.ptb.de [192.53.103.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE0461202DF; Wed, 24 Jul 2019 00:04:13 -0700 (PDT)
Received: from smtp-hub.bs.ptb.de (smtpint01.bs.ptb.de [141.25.87.32]) by mx1.bs.ptb.de with ESMTP id x6O74BaT009346-x6O74BaV009346 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Wed, 24 Jul 2019 09:04:11 +0200
Received: from lotus.bs.ptb.de (lotus.bs.ptb.de [141.25.85.200]) by smtp-hub.bs.ptb.de (Postfix) with ESMTPS id BD678814502; Wed, 24 Jul 2019 09:04:11 +0200 (CEST)
In-Reply-To: <5D37F4FC020000A1000325EE@gwsmtp.uni-regensburg.de>
References: <CAJm83bD89oPE+WouWUD=qVqFzZ5-vw6E3RVsdVRteH0cEXyYjg@mail.gmail.com> <5D37F4FC020000A1000325EE@gwsmtp.uni-regensburg.de>
To: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
Cc: Daniel Franke <dfoxfranke@gmail.com>, "ntp@ietf.org" <ntp@ietf.org>, ntp <ntp-bounces@ietf.org>
MIME-Version: 1.0
Message-ID: <OF90C7651E.DC859996-ONC1258441.002689EA-C1258441.0026D5AB@ptb.de>
From: kristof.teichel@ptb.de
Date: Wed, 24 Jul 2019 09:04:59 +0200
Content-Type: multipart/alternative; boundary="=_alternative 0026D5A9C1258441_="
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/GJDcjfjvcDHLd26vQ01TYIR7_aA>
Subject: Re: [Ntp] Antw: Follow-up to yesterday's mic comment about PTP security
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jul 2019 07:04:16 -0000

"ntp" <ntp-bounces@ietf.org> schrieb am 24.07.2019 08:04:44:

> Von: "Ulrich Windl" <Ulrich.Windl@rz.uni-regensburg.de>
> An: "Daniel Franke" <dfoxfranke@gmail.com>, "ntp@ietf.org" 
<ntp@ietf.org>
> Datum: 24.07.2019 08:05
> Betreff: [Ntp] Antw: Follow-up to yesterday's mic comment about PTP 
security
> Gesendet von: "ntp" <ntp-bounces@ietf.org>
> 
> >>> Daniel Franke <dfoxfranke@gmail.com> schrieb am 23.07.2019 um 18:19 
in
> Nachricht
> <CAJm83bD89oPE+WouWUD=qVqFzZ5-vw6E3RVsdVRteH0cEXyYjg@mail.gmail.com>:
> > My comments yesterday about PTP security shifted context a few times
> > so it may have been hard to follow what I was claiming. My assertions
> > were:
> > 
> > 1. If you need 50ms precision, pick some good public NTP servers and 
use 
> > NTS.
> 
> Interestingly I think most data centers would like to have 1a: 100µs to 
5ms.
> Are you saying NTS can't do better than a few ms?

Depends on what you need: with NTS, you get a 100% security and 
correctness guarantee for the error in your measured offset being at most 
half of the flight time (plus a negligible delta).
Now, it is very likely that your measured offset is much better than that 
- but the more you're relying on the assumption of symmetric packet travel 
times, the less certainty you get - and the more susceptible you become 
towards delay attacks.
 
> > 
> > 2. If you need 100µs precision, colocate a time source in the same
> > datacenter as the client systems. Use NTP and NTS; you don't need PTP
> > for this.
> > 
> > 3. If you need 1µs precision, use PTP and physically secure the link
> > between the time source and the clients so that cryptographic
> > authentication is unnecessary.
> > 
> > 4. If you need 1µs precision over an adversarial network, good luck!
> > This is simply not achievable and no amount of cryptographic pixie
> > dust is ever going to save you.
> > 
> > _______________________________________________
> > ntp mailing list
> > ntp@ietf.org 
> > https://www.ietf.org/mailman/listinfo/ntp 
> 
> 
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org
> https://www.ietf.org/mailman/listinfo/ntp