Re: [Ntp] Eric Rescorla's Discuss on draft-ietf-ntp-bcp-10: (with DISCUSS and COMMENT)

Denis Reilly <denis.reilly@orolia.com> Tue, 26 March 2019 22:03 UTC

Return-Path: <denis.reilly@orolia.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F34412034E; Tue, 26 Mar 2019 15:03:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=orolia.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HNRVFlAjw3O3; Tue, 26 Mar 2019 15:03:13 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-he1eur02on062a.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe05::62a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A55491200B6; Tue, 26 Mar 2019 15:03:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=orolia.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZhKrSiN01DVtuLYmYjJDt8IY/Qitu2/GfbJqkV7x9Jc=; b=mTj/ivgMIWDpYaI3gUDyeRgPjuGHhoWKQC/vy2kx3t4OAun3RAOU+ed5615h2JYiVYveBq3FbiNO9LJPojoue+4DJAXAZPwywaG+o/uoFK2BNpVPK6FfIOggGQNvC6NspAJ0eH8BzGGgYHGrtqS/RyXD4KTx65lWNu1lWDM287I=
Received: from AM6PR0602MB3733.eurprd06.prod.outlook.com (52.133.31.28) by AM6PR0602MB3496.eurprd06.prod.outlook.com (52.133.22.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1730.18; Tue, 26 Mar 2019 22:03:09 +0000
Received: from AM6PR0602MB3733.eurprd06.prod.outlook.com ([fe80::d969:a1a0:1484:dda9]) by AM6PR0602MB3733.eurprd06.prod.outlook.com ([fe80::d969:a1a0:1484:dda9%7]) with mapi id 15.20.1750.014; Tue, 26 Mar 2019 22:03:09 +0000
From: Denis Reilly <denis.reilly@orolia.com>
To: Eric Rescorla <ekr@rtfm.com>
CC: The IESG <iesg@ietf.org>, "ntp-chairs@ietf.org" <ntp-chairs@ietf.org>, "ntp@ietf.org" <ntp@ietf.org>, "odonoghue@isoc.org" <odonoghue@isoc.org>, "draft-ietf-ntp-bcp@ietf.org" <draft-ietf-ntp-bcp@ietf.org>
Thread-Topic: Eric Rescorla's Discuss on draft-ietf-ntp-bcp-10: (with DISCUSS and COMMENT)
Thread-Index: AQHUmAY1Q7EpSB6pBEm48Mr/tOhYXKWzxLtggGSj+ICABhNPoA==
Date: Tue, 26 Mar 2019 22:03:07 +0000
Message-ID: <AM6PR0602MB3733693ADA0803416B3536AAFF5F0@AM6PR0602MB3733.eurprd06.prod.outlook.com>
References: <154527054937.2209.11236792660983022790.idtracker@ietfa.amsl.com> <AM0PR0602MB373042D6BA57B56999B91864FF830@AM0PR0602MB3730.eurprd06.prod.outlook.com> <CABcZeBMXnaCebrRfL=SHN8+3qTjcrb7yFWG2AfSf=FWXOtiPEg@mail.gmail.com>
In-Reply-To: <CABcZeBMXnaCebrRfL=SHN8+3qTjcrb7yFWG2AfSf=FWXOtiPEg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=denis.reilly@orolia.com;
x-originating-ip: [66.193.84.98]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 199b8bab-953c-4fd7-9bbb-08d6b236d4fe
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600127)(711020)(4605104)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7153060)(7193020); SRVR:AM6PR0602MB3496;
x-ms-traffictypediagnostic: AM6PR0602MB3496:
x-ms-exchange-purlcount: 3
x-microsoft-antispam-prvs: <AM6PR0602MB349621570D974110A1C67F4CFF5F0@AM6PR0602MB3496.eurprd06.prod.outlook.com>
x-forefront-prvs: 09888BC01D
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(136003)(376002)(346002)(39850400004)(396003)(199004)(189003)(51914003)(13464003)(26005)(11346002)(316002)(606006)(21615005)(52536014)(236005)(53936002)(71200400001)(14454004)(105586002)(71190400001)(186003)(4326008)(30864003)(106356001)(102836004)(81166006)(6916009)(54906003)(68736007)(3846002)(8676002)(2906002)(81156014)(790700001)(6116002)(4001150100001)(97736004)(44832011)(5660300002)(53546011)(229853002)(256004)(66066001)(476003)(86362001)(7736002)(6436002)(99286004)(486006)(6506007)(25786009)(55016002)(74316002)(966005)(6306002)(6246003)(54896002)(446003)(9686003)(478600001)(33656002)(5024004)(8936002)(7696005)(14444005)(76176011); DIR:OUT; SFP:1101; SCL:1; SRVR:AM6PR0602MB3496; H:AM6PR0602MB3733.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: orolia.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: p3Do2n3SB14NfQB1Wei5kFSPSXUNNCNfuXysOSjFcF15O048pJJtat8q8e+2lyR3XZFq9wufQRi4jxo9/D4oq/SgkX24RYjA0Ymw+JgPOl0jVCLhTXsKZynePhpaZxyqOH5FKMYo0oTh4k/JbWFG7sJHl5YerWXgiCvk1RZXgBlTAGSZQXsGEu4lXcEFIT+KskNpD2R78hPlP9XfDYSTw2zbFzX7OmDxYCtk6PQ+10/Kp1MGzY6CtSUo7GMHnl5Ki7vMPV906KWOSvWx/p84m3xSu2MgE36Oh0EvqxDKC5N4mCx1kixDFfT9FoJHmY/R76NmkkPHb6fzTzEpbxA2zvk+o8xpMZu2wl0hdI8KdIK0w+0/U0zbpNp0gGajU2eOkD8EYuT5XI8Y0r6P6I2s/80fIsa93XORf+O9zuLj8VE=
Content-Type: multipart/alternative; boundary="_000_AM6PR0602MB3733693ADA0803416B3536AAFF5F0AM6PR0602MB3733_"
MIME-Version: 1.0
X-OriginatorOrg: orolia.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 199b8bab-953c-4fd7-9bbb-08d6b236d4fe
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Mar 2019 22:03:08.0310 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: a263030c-9c1b-421f-9471-1dec0b29c664
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR0602MB3496
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/sTBs28-7j4EpzeueIPxrWEnWri8>
Subject: Re: [Ntp] Eric Rescorla's Discuss on draft-ietf-ntp-bcp-10: (with DISCUSS and COMMENT)
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Mar 2019 22:03:19 -0000

Thanks for your feedback! I see 5 places where you require a response, please find them below with the tag “Mar 26 Response:”

I will be updating the draft with these changes shortly.

Best Regards,

--
Denis Reilly  |  Technical Lead  |  denis.reilly@orolia.com<mailto:denis.reilly@orolia.com>  (585)321-5837<tel:(585)%20321-5837>

From: Eric Rescorla <ekr@rtfm.com>
Sent: Friday, March 22, 2019 12:29 PM
To: Denis Reilly <denis.reilly@orolia.com>
Cc: The IESG <iesg@ietf.org>; ntp-chairs@ietf.org; ntp@ietf.org; odonoghue@isoc.org; draft-ietf-ntp-bcp@ietf.org
Subject: Re: Eric Rescorla's Discuss on draft-ietf-ntp-bcp-10: (with DISCUSS and COMMENT)



On Thu, Jan 17, 2019 at 10:14 AM Denis Reilly <denis.reilly@orolia.com<mailto:denis.reilly@orolia.com>> wrote:
Hello, Eric! Thanks for the review. Sorry for the late reply. I've posted a new version of the draft which incorporate the feedback from the review.

Please see our responses in-line:

--
Denis Reilly  |  Technical Lead  |  denis.reilly@orolia.com<mailto:denis.reilly@orolia.com>  (585)321-5837

-----Original Message-----
From: Eric Rescorla <ekr@rtfm.com<mailto:ekr@rtfm.com>>
Sent: Wednesday, December 19, 2018 8:49 PM
To: The IESG <iesg@ietf.org<mailto:iesg@ietf.org>>
Cc: ntp-chairs@ietf.org<mailto:ntp-chairs@ietf.org>; Karen O'Donoghue <odonoghue@isoc.org<mailto:odonoghue@isoc.org>>; ntp@ietf.org<mailto:ntp@ietf.org>; odonoghue@isoc.org<mailto:odonoghue@isoc.org>; draft-ietf-ntp-bcp@ietf.org<mailto:draft-ietf-ntp-bcp@ietf.org>
Subject: Eric Rescorla's Discuss on draft-ietf-ntp-bcp-10: (with DISCUSS and COMMENT)

Eric Rescorla has entered the following ballot position for
draft-ietf-ntp-bcp-10: Discuss

When responding, please keep the subject line intact and reply to all email addresses included in the To and CC lines. (Feel free to cut this introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-ntp-bcp/



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

Rich version of this review at:
https://mozphab-ietf.devsvcdev.mozaws.net/D3844

I notice that a number of the recommendations here differ from those in NDSS16. In particular the following recommendations from that paper do not seem to appear:

- Do not put INIT in the reference ID on restart
- Do not send KoD
- Disable fragmentation
- Randomize source ports

I'm not saying that all of these recommendations need to be in this document, but I am curious why they are not and would tend to think that one should document why they are not.

Response:
We worked closely with Sharon Goldberg, one of the authors on the referenced paper, when writing this section. While the paper makes the recommendations you list, we simply didn't want to include everything in the BCP, but rather include the things that would have the most immediate impact.

- The advice for not putting INIT in the reference ID on restart might be useful to include after all, as we do give other advice for implementors at the end of the "Avoiding Daemon Restart Attacks" section, so we will add it.

- The paper lists "eliminate NTP's KoD" as one recommendation, but then immediately acknowledges that it eliminates a server's ability to deal with heavy volumes of traffic. We elected to not recommend the elimination of KoDs, in part because there will be many servers deployed who still use them.  Perhaps that is a topic for NTP v5, someday.

- The paper suggests that the attack surface for the NTP fragmentation attack is "small but non-negligible". We felt the attack surface was not large enough
to include directly in this BCP. Since the paper is referenced in multiple places, though, interested readers (such as yourself) would be able to find it.

- The paper mentions Source Port Randomization as a possibility to mitigate the fragmentation attack, but then goes on to say that it is not a "sufficient defense".

All right.



DETAIL
S 2.1.
>      response to a small query, which makes it more attractive as a vector
>      for distributed denial-of-service attacks.  (NTP Control messages are
>      discussed further in Section 3.4).  One documented instance of such
>      an attack can be found here [1], and further discussion in [IMC14]
>      and [NDSS14].  Mitigating source address spoofing attacks should be a
>      priority of anyone administering NTP.

what does this text mean? What practices can I engage in as an NTP server that mitigate source spoofing attacks? The next paragraph seems to largely talk about traffic *sources*. Is the assumption that the NTP server is supposed to do BCP 38 filtering? That seems not that effective.

As a smaller point, I see that this text says "should", not SHOULD. Is that a mistake or is this intended not to have any normative force?

Response:
As part of another comment, we've moved the "mitigating source address spoofing attacks" sentence to the next paragraph, to further highlight
it's relation to BCP38.

BCP38 would provide some level of protection against spoofing attacks, but as you note it's not really effective when applied at the server
level. This is why we give the guidance for large ISP's and networks.

We do have normative language later in that paragraph now saying that "It is RECOMMENDED that ISP's and large corporate networks implement ingress and egress filtering", and we feel that's enough.

But these aren't things that the *server* can do, really. So, I don't understand how it's meaningful to say that it should be a priority to mitigate these attacks for "anyone administering NTP"

Mar 26 Response:
Now we see the problem. We wanted to emphasize the important of mitigating these attacks, but as you note there’s not much that “anyone administering NTP” can do. And as stated before, we do give normative language later in the paragraph that does not have the same issue. So we have decided to remove that sentence entirely – we think the section still provides the proper guidance without it.



S 3.2.
>      See Section 3.7.1 for more information.
>
>      Operators SHOULD monitor all of the time sources that are in use.  If
>      time sources do not generally agree, find out the cause and either
>      correct the problems or stop using defective servers.  See
>      Section 3.5 for more information.

It's not really possible to evaluate this advice without any description of the threat model, which is pretty sketchily covered below. In particular, if an attacker controls my network, then it's basically like having one NTP server, no matter how many people I am talking to, and even an inaccurate but secure server (e.g., tlsdate) is superior.

Response:
In Sec. 3.2 we give advice on the number of time sources so that NTP's  inherent selection mechanisms are enabled to protect against unintentionally false time sources. We don't consider the case in which adversaries are able to manipulate NTP packets. This is done in Sec. 4.

Then you need to state that this isn't intended to deal with this threat model.

Mar 26 Response:
We will add this paragraph after our list:

This analysis assumes that a majority of the servers used in the
    solution are honest, even if some may be inaccurate.  Operators should
    be aware of the possibility that if an attacker is in control of the
    network, the time coming from all servers could be compromised.



S 3.2.
>
>      o  If there are 2 sources of time and they agree well enough, then
>         the best time can be calculated easily.  But if one source fails,
>         then the solution degrades to the single-source solution outlined
>         above.  And if the two sources don't agree, then it's impossible
>         to know which one is correct by simply looking at the time.

This isn't strictly true. Consider the case where I have an iPhone and the onboard clock reads 2018-12-19 and the NTP server reads 2001. I know the NTP server is wrong because iPhones didn't exist in 2001.

Response:
Only if the iPhone is smart enough to disqualify the rogue source, in which case you're still back to 1 source. I think the advice here still stands.

The problem here is the statement that it is "impossible". That is clearly false.

Mar 26 Response:
We will change that sentence to:

And if the two sources don't agree, it will be
difficult to know which one is correct without making use of
information from outside the protocol.



--

S 3.4.
>      optionally authenticated control of NTP and its configuration.  Used
>      properly, these facilities provide vital debugging and performance
>      information and control.  Used improperly, these facilities can be an
>      abuse vector.  For this reason, it is RECOMMENDED that publicly-
>      facing NTP servers should block mode 6 queries from outside their
>      organization.

Why are these facilites an abuse vector

Response:
We've clarified that a bit: "But these facilities can be a vector for amplification attacks when abused."

OK.


--


S 3.5.
>
>      If a system starts getting unexpected time replies from its time
>      servers, that can be an indication that the IP address of the system
>      is being forged in requests to its time server.  The goal of this
>      attack is to convince the time server to stop serving time to the
>      system whose address is being forged.

Why would this work? Some sort of rate limit on the server.

Response:
We've rewritten this for clarity:
If a system starts to receive NTP Reply packets from a time server
that do not correspond to any requests sent by the system, that can be
an indication that an attacker is forging that system's IP address in
requests to the remote time server. The goal of this attack would be to
convince the time server to stop serving time to the
system whose address is being forged.

I think you need to state that the time server will potentially throttle in response to this.

Mar 26 Response:
We propose clarifying the last sentence:

If a system starts to receive NTP Reply packets from a remote time server
that do not correspond to any requests sent by the system, that can be
an indication that an attacker is forging that system's IP address in
requests to the remote time server. The goal of this attack is to
adversely impact the availability of time to the targeted system whose
address is being forged. Based on these forged packets, the
remote time server might decide to throttle or rate limit packets, or
even stop sending packets to the targeted system.



S 7.
>      anycast servers may arbitrarily enter and leave the network, the
>      server a particular client is connected to may change.  This may
>      cause a small shift in time from the perspective of the client when
>      the server it is connected to changes.  It is RECOMMENDED that
>      anycast only be deployed in environments where these small shifts can
>      be tolerated.

Who is this guidance to? It seems like the clients might well not know, but they are the ones who tolerate the shift (or not).

Response:
The guidance is to the network operators, and ultimately to the users of the  NTP service. Utilizing Anycast in this manner may affect the quality of the
recovered time. But in some applications, this is preferable to potentially  having to change the configuration of a large number of clients whenever a server is added or removed.

How do the clients know whether anycast is in use?

Mar 26 Response:
The clients have no way of knowing whether anycast is in use. so it's up to whoever is setting up the Anycast-based time transfer network to come to the determination that any small shifts can be tolerated. I guess there is an assumption here that the network operators know what the use case of their users are.

So we will change the recommendation:
It is RECOMMENDED that network operators
only deploy anycast NTP in environments where operators know these
small shifts can be tolerated by the applications running on the clients
being synchronized in this manner

-Ekr


ATTENTION: This email came from an external source.
Do not open attachments or click on links from unknown senders or unexpected emails.