[Ntp] Antw: Re: Details of the fragmentation attacks against NTP and port randomization

"Ulrich Windl" <Ulrich.Windl@rz.uni-regensburg.de> Tue, 02 July 2019 13:43 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6159912009E for <ntp@ietfa.amsl.com>; Tue, 2 Jul 2019 06:43:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YfmLekP_ZCEv for <ntp@ietfa.amsl.com>; Tue, 2 Jul 2019 06:43:39 -0700 (PDT)
Received: from mx2.uni-regensburg.de (mx2.uni-regensburg.de [IPv6:2001:638:a05:137:165:0:3:bdf8]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28A5B120075 for <ntp@ietf.org>; Tue, 2 Jul 2019 06:43:39 -0700 (PDT)
Received: from mx2.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 79BA76000051 for <ntp@ietf.org>; Tue, 2 Jul 2019 15:43:36 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx2.uni-regensburg.de (Postfix) with ESMTP id DFF21600004D for <ntp@ietf.org>; Tue, 2 Jul 2019 15:43:33 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Tue, 02 Jul 2019 15:43:33 +0200
Message-Id: <5D1B5F84020000A10003211E@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.1.1
Date: Tue, 02 Jul 2019 15:43:32 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: "ntp@ietf.org" <ntp@ietf.org>
References: <CAN2QdAGS20q=7+r+qMFEBBu4gNmSDR9-vYDbvgC=ZnqWLEU-6w@mail.gmail.com> <739c2eaa-05f1-0b30-4b64-fc5d3f91ce5b@pdmconsulting.net> <a3a545cf-d83d-a2c7-ad6c-3e349de78615@si6networks.com> <9f75e400-cf2f-053f-ed06-f4d6df415eaf@pdmconsulting.net> <70d86938-5d50-7732-5257-c698d7d308d6@si6networks.com> <b4a5d0ec-606e-7994-9bc9-e21e24f38def@ntp.org> <f4b5312c-b02c-ee51-1c59-f0467f51ab77@si6networks.com> <OF8F5917D8.BA274E92-ONC1258418.004C2FAF-C1258418.0052EEFB@ptb.de> <20190613100006.45108edd@rellim.com> <68186be5-764d-73e7-1631-04567edf28a7@si6networks.com> <20190613122929.0e049722@rellim.com> <3b7c6e55-b2a9-443c-e5cb-3b4c9e5bb642@si6networks.com> <20190614112522.2e5676f3@rellim.com> <73f861c1-72e0-5e01-87e1-18658cd11859@si6networks.com>
In-Reply-To: <73f861c1-72e0-5e01-87e1-18658cd11859@si6networks.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/V2sz1DvARgCeeurNruyo3vDfKTg>
Subject: [Ntp] Antw: Re: Details of the fragmentation attacks against NTP and port randomization
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 02 Jul 2019 13:43:42 -0000

Hi!

Maybe the sentence "With changing port numbers there is a specific probability
that the packet run times (transmission / reception) may change, having an
effect on the accuracy of NTP that prefers fixed and symmetric packet run
times." can make it into the document, making both parties happy; those for
randomizing ports and those against ;-)

Note that in theory the effect on accuracy could be positive as well, but most
likely not in the general case.

Regards,
Ulrich Windl


>>> Fernando Gont <fgont@si6networks.com> schrieb am 02.07.2019 um 14:31 in
Nachricht <73f861c1-72e0-5e01-87e1-18658cd11859@si6networks.com>:
> Hello, Gary,
> 
> On 14/6/19 19:25, Gary E. Miller wrote:
>> Yo Fernando!
>> 
>> On Fri, 14 Jun 2019 14:07:29 +0300
>> Fernando Gont <fgont@si6networks.com> wrote:
>> 
>>>> PROVEN to degrade.  With a few known mechanisms for that understood.
>>>> Many more suspected but as yet undocumented.  
>>>
>>> What I'm saying it: the port number may affect the path in scenarios
>>> where forwarding is somewhat based on the port number.
>> 
>> Yes.  That is one of a great many scenarios where randomizing the port
>> per connection degrades the time qulity of the connection.
> 
> Just for the record: all of the revs we have published so for advised to
> randomize the port on a per‑association basis, not on a "per
> transaction" basis.
> 
> 
>> 
>>> Unless you
>>> assume that every router forwards packets with a hash‑based algorithm
>>> that includes the port, then randomization *may* affect the path.
>> 
>> So you propose one, of many, ways the random port per connection is
>> bad.  Then sweep all the others under the rug because they are not that
>> one?  Sloppy thinking.
> 
> No. I noted that the I‑D has so far proposed to randomize the port on a
> per‑association basis, something that does not degrade the time quality.
> That's what I've said.
> 
> We can add a discussion of "randomizing per‑association vs.
> per‑transaction basis". In which case we should note the effect of
> randomization on time quality. SO far that's not what the document has
> been proposed. Hence I asked (and still ask) what are the alledged
> negative effects of the type of randomization the I‑D is actually
proposing.
> 
> 
> 
> 
>>> That said, at least in the IPv4 world, you have to learned to live
>>> with this, since the pervasive of NATs means that it may be
>>> impossible to enforce src=PORT (whatever port is), unless e.g. you
>>> send requests every t<30 secs which is a usual NAT timeout for and
>>> UDP "flow".
>> 
>> Yup.  The point of this discussion is finding the best of all the
>> imperfect options.
> 
> When you randomize on the per‑association basis (as opposed to
> per‑transaction basis), I still fail to see what are the problems it
brings.
> 
> 
>> 
>>>> But your summary did not mention it.  
>>>
>>> Indeed the last rev didn't mentioned. In all fairness, I think it was
>>> you that raised this (and we already starting working on this on our
>>> working copy) ‑‑ those who objected to port randomization didn't raise
>>> this, and even less considered per‑association vs per‑request
>>> randomization in the objections they voiced.
>> 
>> I read the room differently. 
> 
> I'm all ears to hear/red your view.
> 
> Thanks!
> 
> Cheers,
> ‑‑ 
> Fernando Gont
> SI6 Networks
> e‑mail: fgont@si6networks.com 
> PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492
> 
> 
> 
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org 
> https://www.ietf.org/mailman/listinfo/ntp