Re: [Ntp] Antwort: Re: The trick to timestamp with authentication

Philip Prindeville <philipp@redfish-solutions.com> Mon, 07 December 2020 18:17 UTC

Return-Path: <philipp@redfish-solutions.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 35B933A1643 for <ntp@ietfa.amsl.com>; Mon, 7 Dec 2020 10:17:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yGeCWGod-Ubl for <ntp@ietfa.amsl.com>; Mon, 7 Dec 2020 10:17:11 -0800 (PST)
Received: from mail.redfish-solutions.com (mail.redfish-solutions.com [45.33.216.244]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8FB263A1642 for <ntp@ietf.org>; Mon, 7 Dec 2020 10:17:11 -0800 (PST)
Received: from [192.168.3.4] ([192.168.3.4]) (authenticated bits=0) by mail.redfish-solutions.com (8.16.1/8.16.1) with ESMTPSA id 0B7IHAA2117388 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 7 Dec 2020 11:17:10 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.20.0.2.21\))
From: Philip Prindeville <philipp@redfish-solutions.com>
In-Reply-To: <20201207135001.GJ2352378@localhost>
Date: Mon, 07 Dec 2020 11:17:10 -0700
Cc: kristof.teichel@ptb.de, ntp@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <CD276F41-5125-466A-A227-175946B059C4@redfish-solutions.com>
References: <20201207105406.GF2352378@localhost> <doug.arnold@meinberg-usa.com> <BEF7C4D9-81CD-42AD-BA06-433D45C0DCD1@meinberg-usa.com> <20201203233634.15F7940605C@ip-64-139-1-69.sjc.megapath.net> <12C6B0FF-8C20-4363-AF41-FDF98B2D8072@meinberg-usa.com> <OF24F50CB5.1E226959-ONC1258637.0049B781-C1258637.0049B784@ptb.de> <20201207135001.GJ2352378@localhost>
To: Miroslav Lichvar <mlichvar@redhat.com>
X-Mailer: Apple Mail (2.3654.20.0.2.21)
X-Scanned-By: MIMEDefang 2.84 on 192.168.1.3
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/I88MWCFvoAbRqjqJYWjKNbv7hvk>
Subject: Re: [Ntp] Antwort: Re: The trick to timestamp with authentication
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Dec 2020 18:17:13 -0000


> On Dec 7, 2020, at 6:50 AM, Miroslav Lichvar <mlichvar@redhat.com> wrote:
> 
> On Mon, Dec 07, 2020 at 02:25:11PM +0100, kristof.teichel@ptb.de wrote:
>>   But having unauthenticated corrections just makes it easier for the
>>   attacker, because writing a false correction might be less effort than an
>>   actual delay attack.
> 
> I'd say it is the opposite. Delaying a packet is not that difficult.
> For example, you can generate traffic in order to increase queueing
> delays in switches/routers.


Such an attack would be much more likely to have a widespread impact, and hence more detectable.


> In a MITM attack you need to prevent the original packet sent by the
> client or server reaching the other host. If you can do that, is it
> easier to sent a modified packet than just waiting a bit before
> sending the captured packet unmodified? I don't think there is a big
> difference.
>