Re: [Ntp] Details of the fragmentation attacks against NTP and port randomization

Danny Mayer <mayer@pdmconsulting.net> Tue, 04 June 2019 03:09 UTC

Return-Path: <mayer@pdmconsulting.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D7E51200FE for <ntp@ietfa.amsl.com>; Mon, 3 Jun 2019 20:09:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yrT888FUqaEp for <ntp@ietfa.amsl.com>; Mon, 3 Jun 2019 20:09:57 -0700 (PDT)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BD9DB1200F4 for <ntp@ietf.org>; Mon, 3 Jun 2019 20:09:57 -0700 (PDT)
Received: from [10.10.10.122] (pool-71-174-223-53.bstnma.east.verizon.net [71.174.223.53]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 45Hxjw1qmnzL7N; Tue, 4 Jun 2019 03:09:56 +0000 (UTC)
To: Watson Ladd <watson=40cloudflare.com@dmarc.ietf.org>, NTP WG <ntp@ietf.org>
References: <CAN2QdAGS20q=7+r+qMFEBBu4gNmSDR9-vYDbvgC=ZnqWLEU-6w@mail.gmail.com>
From: Danny Mayer <mayer@pdmconsulting.net>
Message-ID: <739c2eaa-05f1-0b30-4b64-fc5d3f91ce5b@pdmconsulting.net>
Date: Mon, 03 Jun 2019 23:09:50 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <CAN2QdAGS20q=7+r+qMFEBBu4gNmSDR9-vYDbvgC=ZnqWLEU-6w@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/gK7d5HEB8nKbo3M_hmZswaSF40U>
Subject: Re: [Ntp] Details of the fragmentation attacks against NTP and port randomization
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Jun 2019 03:09:59 -0000

On 6/3/19 2:24 PM, Watson Ladd wrote:

> Dear all,
>
> The debate over client port randomization is missing an important
> fact: off-path attacks against NTP are not prevented by the origin
> timestamp due to the OS handling of fragmentation. In
> http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf we see that sending
> a properly crafted IP fragment can selectively overwrite NTP packets,
> thus allowing an attacker to modify received data without overwriting
> the origin timestamp. I would recommend we adopt port randomization
> to handle this problem.
>
> Sincerely,
> Watson Ladd

Actually if you read Section VI you will see that the last sentence of
that section states that they do not consider it to be a sufficient defense.

Danny