[Ntp] IETF 104, Minutes of NTP/TICTOC WG session

Dieter Sibold <dsibold.ietf@gmail.com> Thu, 28 March 2019 14:54 UTC

Return-Path: <dsibold.ietf@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A51571204AF for <ntp@ietfa.amsl.com>; Thu, 28 Mar 2019 07:54:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m_EUDlsPHbCc for <ntp@ietfa.amsl.com>; Thu, 28 Mar 2019 07:54:46 -0700 (PDT)
Received: from mail-ed1-x541.google.com (mail-ed1-x541.google.com [IPv6:2a00:1450:4864:20::541]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8C83712042D for <ntp@ietf.org>; Thu, 28 Mar 2019 07:54:45 -0700 (PDT)
Received: by mail-ed1-x541.google.com with SMTP id p20so16996563eds.6 for <ntp@ietf.org>; Thu, 28 Mar 2019 07:54:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:thread-topic:thread-index:date:message-id :accept-language:content-language:content-transfer-encoding :mime-version; bh=VeBj9luVyYTMBmwG7zqyAES+99kntlrX/qSJwP3ha6g=; b=h/hONS1MzMFAyL7kkpHKGtd3YOZgC+vtmtUgZoVP2oMOcLua5lg2gwrg6MpPT/Rs6u om2BL6/4q9So8ySp8LtDiqEB7QLM6IdA13KF7FHQ/O2tRnRxpjkAILNYd0I91gbrItt0 iRyM0EYxOVyOOxbcF3/OUyHUOj8OyZLXXpKT7jWgPTr8SNKpQlV4DGSeeYjkODWkE683 /lDPsQKsNE/nry4VhofHE2qqmuzDAS4s3qLzl07J4oDpOkfh0T8OXtCcIb/qOwHSNyqL /aB47EkeJO8I6Q81nyJ1CAL3uFviRZcndoWkN0DoAFM+I1M7+HoFfDWsaz0TyozMwoOG SvTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:thread-topic:thread-index:date :message-id:accept-language:content-language :content-transfer-encoding:mime-version; bh=VeBj9luVyYTMBmwG7zqyAES+99kntlrX/qSJwP3ha6g=; b=DXJhijG1WbjBudmpmFwPbHI4onNjoIkhgs3hfaSyYNi3p2iJ+HSp/YbSujV3gEwXH6 87af8Y+6p4Y2/YUV7UQErdILUIMIeSVsOJq8KNqSN4cE7IJhzWVZ7xTLPnZQkdjqD/Sy JsAmHcBXaaG07IS3+93eLL9FL2ZQFTVPAxNGb3EyCLks5wPDE8sHbTBQSSM9ZJ4zZLjy Z2aMuoTcs1tSs/cH+/TbwQcT3gYf1KuMPEQv9B6B79sa8NZj80SwyQ/kJ7P32y5B8WVD 02l7BpSqvjVLU+nwrONjfOCkIeEngoMzSGY/Hgf24RqkZQw6tdptsTVTy8tOt+mfmn+f o1xg==
X-Gm-Message-State: APjAAAX/ROp9ZicGWpQSipfuuOYNuFt3QcoaKo6B7SVKc1/FR5DhN34k xFtvbyKm5kxuKz6+7L2wOULkVmp0
X-Google-Smtp-Source: APXvYqwdiM6/QIBj8OuV3mdyy3BERLpEFvPCLPjByAI+QEPsNPVRZUpjBj0cVIdW2fMgcL+n1nziTg==
X-Received: by 2002:a17:906:4ca:: with SMTP id g10mr24744471eja.88.1553784883520; Thu, 28 Mar 2019 07:54:43 -0700 (PDT)
Received: from AM0PR08MB4546.eurprd08.prod.outlook.com ([52.97.163.157]) by smtp.gmail.com with ESMTPSA id n3sm5183344ejc.32.2019.03.28.07.54.42 for <ntp@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 28 Mar 2019 07:54:43 -0700 (PDT)
From: Dieter Sibold <dsibold.ietf@gmail.com>
To: "ntp@ietf.org" <ntp@ietf.org>
Thread-Topic: IETF 104, Minutes of NTP/TICTOC WG session
Thread-Index: AQHU5XYsJkLXuBuWJkepr/rFDVQQnA==
X-MS-Exchange-MessageSentRepresentingType: 1
Date: Thu, 28 Mar 2019 14:54:42 +0000
Message-ID: <AM0PR08MB4546934F7360F13E23871DF1F8590@AM0PR08MB4546.eurprd08.prod.outlook.com>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-Exchange-Organization-SCL: -1
X-MS-TNEF-Correlator:
X-MS-Exchange-Organization-RecordReviewCfmType: 0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/h9sydis663bCdbL34Od1Bk6kQ9M>
Subject: [Ntp] IETF 104, Minutes of NTP/TICTOC WG session
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 28 Mar 2019 14:54:50 -0000

Dear all,

I've just uploaded the minutes from the NTP/TICTOC WG session during IETF 104. Thanks to Tal who provided the minutes.

https://datatracker.ietf.org/meeting/104/materials/minutes-104-ntp-00.txt


Dieter


----------------------------

===============================
NTP / TICTOC Joint Session
IETF 104 - Prague
Tuesday, March 26, 2019
13:50-15:50 (UTC+01:00)
Meeting Minutes
===============================

NTP WG chairs: Karen O'Donoghue, Dieter Sibold
TICTOC WG chairs: Karen O'Donoghue

Meeting minutes: Tal Mizrahi

Chair Slides
------------
Presenter: Karen O'Donoghue
Slides:
https://datatracker.ietf.org/meeting/104/materials/slides-104-ntp-ntp-wg-chair-slides-00

Summary:
- Note well was presented.
- The agenda for the current session was presented.
- The content is summarized below for each of the working groups.

==============
TICTOC Session
==============

Summary:
- YANG data model is in the editor queue.
- IEEE 1588 enterprise profile - ready for submission to the IESG.
- Suresh: we are trying to formalize the process with the IEEE regarding IETF documents pertaining to IEEE standards that are not necessarily available.
- The plan is to close the TICTOC working group after the items above are complete.


===========
NTP Session
===========

Summary:
- NTP BCP is currently under discussion in the IESG.
- Suresh: currently not enoug votes to approve the BCP. There is an outstanding DISCUSS.
- Denis Reilly: we have internally agreed about some changes in the document that may be able to address the outstanding DISCUSS.
- Karen: please do that, and submit an updated document.
- Suresh: we have been disucssing it in the IESG. Denis - thank you for pushing this. Will try to get it discussed on the next IESG telechat.
- Control messages protocol draft: updating some of the NTPv4 functionality that has been left out of the original RFC 5905.
- Guidelines for defining packet timestamps: ready for submission to the IESG. We just need to get it processed.
- NTS for NTP: 
    - Dieter: there is some new content that we are working on.
    - Daniel Franke: we will have two minor clarifications in NTS following the hackathon.


Hackathon Report
----------------
Presenter: Christer Weinigel

Presentation:
https://datatracker.ietf.org/meeting/104/materials/slides-104-ntp-ietf-hackathon-network-time-security-nts-01

Summary:
- Four working implementations.
- Interop test was successful.
- Several bugs fixed.
- No significant problems in the NTS draft were found.

Discussion:
- NTS has already passed working group last call.
- There will be a clarification about the fact that some implementations had some problems.
- After that NTS is ready to be sent to the IESG.
- Daniel Franke: the NTS spec is clear. We just need a clarification about the fact that some implementers did not read RFC 7822, and did not implement it correctly.


Roughtime
---------
Presenter: Aanchal Malhotra 

Draft: 
https://www.ietf.org/archive/id/draft-roughtime-aanchal-01.txt

Presentation:
https://datatracker.ietf.org/meeting/104/materials/slides-104-ntp-roughtime-00

Summary:
- This is the second version of the draft. 
- There was some discussion in a virtual interim, and some in the mailing list.

Discussion:
- Tal Mizrahi: important to include threat analysis in the draft. Which threats roughtime deals with and which ones are not dealt with. Current draft is not detailed enough in terms of threats. Second major problem in the draft is delay attacks. The current version of the draft does not deal with delay attacks, and the scope of the damage that a delay attacker can do.
- Aanchal: some of these comments were on the mailing list and answered. We need to add a threat model.
- Tal: and regarding delay attacks? It is not only a threat model. It is a matter of adding something to the mechanism. We saw examples on the mailing list of how a delay attacker can completely compromise Roughtime.
- Aanchal: we may not be on the same page.
- Tal: plese reply on the mailing list, as I have not seen a response from you to the delay attack issue.
- Aanchal: I did respond on the mailing list to delay attacks.
- Daniel Franke: regarding policy - need mechanism for getting trusted lists. We do not want layer 8 policy. Second comment: I hope to see a call for adoption.
- Aanchal: regarding first comment - I just mentioned it since it was discussed on the interim, but this is not too important for the draft. 
- Thomas Peterson: I would like to contribute, but Github is not updated. Please use Github issues, and update Github.
- Watson Ladd: I am a coauthor. Regarding policy, it is not a question of policy, but we want one place where reports of malfeasance discussed.
- Leif Johansson: I also think we need a threat analysis. There are already other mechanisms for securing time: multiple servers. We need to talk about the uses of secure time, and based on that to define mechanisms.
- Kristof Teichel: not sure delay attacks affect Roughtime. Roughtime can detect something is wrong. I do not think there is much more to be done. 
- Marcus Dansarie: I like the draft. Timescale: the draft suggests TAI. It is generally recommended to use UTC. A protocol that synchronizes needs to tell the user the time of day. Trust anchoring is something we need to talk about.
Aanchal: the draft says the servers should use a common source of time such as GPS.
- Jose: what is the precision?
- Thomas: microseconds.
- Daniel: Kristof's comment about delay attacks are not correct. The impact of a delay attack is that the longer the adversay delays the message, the more the timestamp is off. There is no way for the client to distinguish between a slow server and an adversary that delays the packet.
- Aanchal: as I explained on the mailing list there is a bound on the delay.
- Tal: following up on the delay discussion. Simple example: we have a server that is off by 1 second. We want Roughtime identify that by having the causality broken. The server can delay the second for 10 seconds before responding to the client. This would hide the fact that the server's time is off, causing the client's retreived time to be off by roughly 5 seconds. This would not be identified by Roughtime, since its a positive delay. Roughtime only detects when there is a negative difference. A specific mechanism should be added to detect delay attacks.
- Aanchal: understood.
- Kristof: I don't understand the example. We are talking about a request-response scheme, so the client can detect that the round trip took a long time, and this would raise a flag. So there is no issue.
- Tal: what you described is exactly the solution that is currently missing in the draft. Having the client measure the round trip time and bound it by a specific value, Roughtime could provide an accuracy on the order of the maximal round trip time. This is currently missing in the draft.
- Kristof: that was obvious to me. If it is not in the draft it needs to be added.
- Watson: I would appreciate if Tal submitted text that describes this. We are not producing a conventional time protocol, but we are only guaranteeing that time is within a certain bound. We are interested in something on the order of minutes of accuracy or seconds of accuracy.
- Leif: the threat model currently does not include the operating system clock - this should be in the draft. Another issue is that you can actually spoof GPS, so that is also a threat to think about.
- Karen: another revision before a call for adoption?
- Stewart: we need a more conventional description of the protocol.
- Karen: we will continue discussion on the mailing list, and do a call for adoption.


A Secure Selection and Filtering Mechanism for NTP
--------------------------------------------------
Presenter: Neta Schiff (remote)

Draft: 
https://datatracker.ietf.org/doc/draft-schiff-ntp-chronos

Presentation:
https://datatracker.ietf.org/meeting/104/materials/slides-104-ntp-a-secure-selection-and-filtering-mechanism-for-the-network-time-protocol-version-4-01

Summary:
- Brief overview of Chronos.
- Prototype of Chronos was implemented.
- Evaluation results presented.

Discussion:
- Jose Igancio Alvarez-Hamelin: I would like to ask about the conditions of the experiment, about the slow shifting experiment.
- Neta: by slowly shifting the time, conventional NTP was affected, but Chronos was not affected. Only preliminary results.
- Heiko Gerstung: how many servers did you use in your experiment?
- Neta: NTP uses 4 servers. Chronos - chose 4 out of 12 servers.
- Karen: we need more feedback on the draft.


A YANG Data Model for NTP
-------------------------
No presentation.

Draft:
https://datatracker.ietf.org/doc/html/draft-ietf-ntp-yang-data-model

Discussion:
- Authors cannot present due to a scheduling conflict.
- Initial YANG doctor review done.
- We will need another revision before WG last call.


AOB
---
- Data minimization: new version submitted last night.
  - Watson: does not make sense to object to a draft because future work may change it.
  - Harlan: was that last commend directed toward me?
  - Watson: yes.
  - Harlan: how do you make your decisions about how to standardize something, or implement it first?
  - Watson: one single implementation should not have the previlige to determine how stuff works. There is no conflict between having the minimization draft and possibly changing it in the future.
  - Harlan: you have your knowledge and I have mine.
  - Aanchal: you can always update the draft later.
  - Kristof: the only feedback was to change SHOULD into MAY, and that would not change much. We can just skip this discussion.
  - Harlan: I have technical objections to the proposed draft. SHOULD is too strong here.
  - Karen: the way to deal with this is to summarize the emails into a consensus call.
  - Daniel: these objections are not new. There seems to be a clear consensus. The objection is based on potential new use cases, and if we want clients to implement some of these use cases in the future, it would be best to use an extension field.
  - Karen: we need to ask a clear question, and ask a group of people to respond to it.
  - Daniel: data minimization is a normative reference for NTS, so we need to be quick in our decision.
  - Suresh: Harlan, there is a reason for SHOULD. You do not have to follow it. It is not a MUST.
  - Harlan: my concern is that the document does not even mention the other cases. Zeroing these fields out blocks these use cases in the future. We do not want to use the argument that a standard should come before the implementation.
  - Karen: it is a normative refernce for NTS.
  - Daniel: neither the code nor the standard exist.

- NTP Interleaved Modes:
  - Mirsolav: there was one remaining issue. Whether the servers could use the same pair of timestamps multiple times. I sent an email, and we discussed this in previous meetings. It is not tolerant to errors. We just need to update the document and submit.

- On implementing time:
  - Aanchal: the draft has not been updated since last IETF meeting.
  - Karen: do you anticipate more work on it?
  - Aanchal: yes.

- Additional Extension Field Proposals:
  - Karen: Harlan submitted a few drafts yesterday. Harlan - please summarize.
  - Harlan: mainly language clean ups. Ref ID updates: the not-you, and the IPv6 REF ID. Main changes: shorter abstract, references to github, a bit of clean up.
  - Karen: draft-ietf-ntp-refid-updates: it is in working group last call, and there were a lot of issues. Please read and comment on the list.
  - Karen: extension field draft was declared as a dead WG document. There will have to be a good reason to come back to it.
  - Harlan: understood. I am significantly revising it.
  - Karen: do the current proposals conflict with RFC 7822?
  - Harlan: the current proposals are compatible with RFC 7822. No conflict.
  - Daniel: a quick review of suggest-refid, it does not comply to RFC 7822.
  - Harlan: it can be padded to comply to RFC 7822.
  - Karen: we are open to extension fields if they are compatible to RFC 7822.
  - Harlan: they are compatible.
  - Harlan: extended information should go to WG adoption call. Revised following some comments.
  - Harlan: I-DO extension field: cleaned it out a bit. Content is much the same. Please consider WG adoption.
  - Harlan: last-ef: should also go to WG adoption.
  - Karen: looks like four proposals for new extension field. We will do a WG adoption call for these.
  - Karen: another proposal was regarding the leap smear.
  - Harlan: helpful for servers that perform leap smearing.
  - Karen: any additional changes needed?
  - Harlan: no. Ready for adoption call.
  - Karen: during WG adoption calls, please read the document, and comment about the document itself.
  - Kristof: what if people decide to use TAI instead of UTC?
  - Harlan: the purpose is to know that someone is following a server that is currently using a leap smear. The main purpose of the REF ID is loop detection. If you use TAI, you lose loop detection.
  - Daniel: you are making a good argument against overloading semantics onto the REF ID.
  - Kristof: I agree.
  - Watson: with NTS, we do not need to worry about packet size limitations.
  - Daniel: agree with Watson. Negotiation can be done with NTS.
  - Harlan: if you do not want to use leap smear, don't. Just want to make sure that people who use leap smear can use it.  
  - Karen: congrats to Aanchal on the new RFC.
  - Karen: we will try to schedule a few interims.


Adjourned at 15:20.