Re: [Ntp] NTPv5 draft

Miroslav Lichvar <mlichvar@redhat.com> Tue, 01 December 2020 09:02 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C66F3A0DA5 for <ntp@ietfa.amsl.com>; Tue, 1 Dec 2020 01:02:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.121
X-Spam-Level:
X-Spam-Status: No, score=-2.121 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OpnwOPlRAWup for <ntp@ietfa.amsl.com>; Tue, 1 Dec 2020 01:02:28 -0800 (PST)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 02EC33A0D98 for <ntp@ietf.org>; Tue, 1 Dec 2020 01:02:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1606813346; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=UhTNBExYoZkR+S7u8JoDLcgYZU9sjw92fNBT5ssHdMc=; b=PXTCak2YG4cgg1zqkDxMhgFGORW2s+EyhUrtDabz3RKlGTWamPL1TqiUVO3T6RT8g70/MW p02qhOs6N3eB7WeZ9p86tKNAPrXchy8Cxty2/ieVEZZby72pv9mOwcKeqXadq/1kZMsr2X +qB6qcCHonnEd8WIiWJOTVR92WSfI+8=
Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-105-0Wv68jkQNIWVaONY29psLg-1; Tue, 01 Dec 2020 04:02:21 -0500
X-MC-Unique: 0Wv68jkQNIWVaONY29psLg-1
Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id E0D0B1074642; Tue, 1 Dec 2020 09:02:16 +0000 (UTC)
Received: from localhost (holly.tpb.lab.eng.brq.redhat.com [10.43.134.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id E85DC5D9C2; Tue, 1 Dec 2020 09:02:15 +0000 (UTC)
Date: Tue, 01 Dec 2020 10:02:13 +0100
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Kurt Roeckx <kurt@roeckx.be>
Cc: Dieter Sibold <dsibold.ietf@gmail.com>, ntp@ietf.org
Message-ID: <20201201090213.GG1900232@localhost>
References: <20201111161947.GG1559650@localhost> <AA848C67-CFB7-43FC-B190-FD3911360373@gmail.com> <20201201081203.GB1900232@localhost> <20201201085051.GL971977@roeckx.be>
MIME-Version: 1.0
In-Reply-To: <20201201085051.GL971977@roeckx.be>
X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mlichvar@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/dH1ptcX3Q3BiSKygAH3Owo48s18>
Subject: Re: [Ntp] NTPv5 draft
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2020 09:02:29 -0000

On Tue, Dec 01, 2020 at 09:50:51AM +0100, Kurt Roeckx wrote:
> If devices like switches can be involved in the protocol too, do
> we also want their data to be authenticated?

If it was easy and practical, maybe. But I suspect it would be
difficult to implement and not very practical. The corrections made by
network devices are expected to be smaller than what a MITM attacker
can generally do by delaying authenticated packets, so there is not
much of a point in authenticating the correction field.

-- 
Miroslav Lichvar