[Ntp] Fwd: New Version Notification for draft-ietf-ntp-port-randomization-02.txt
Fernando Gont <fgont@si6networks.com> Thu, 16 April 2020 18:22 UTC
Return-Path: <fgont@si6networks.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B23F63A0AF5; Thu, 16 Apr 2020 11:22:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T4L-OQBEgxrv; Thu, 16 Apr 2020 11:22:28 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1DE923A0ADE; Thu, 16 Apr 2020 11:22:27 -0700 (PDT)
Received: from [192.168.0.10] (unknown [181.45.84.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 08827893CB; Thu, 16 Apr 2020 20:22:24 +0200 (CEST)
References: <158706113942.27424.5328137517371748525@ietfa.amsl.com>
To: "ntp@ietf.org" <ntp@ietf.org>
From: Fernando Gont <fgont@si6networks.com>
Cc: "ntp-chairs@ietf.org" <ntp-chairs@ietf.org>
X-Forwarded-Message-Id: <158706113942.27424.5328137517371748525@ietfa.amsl.com>
Message-ID: <bb5a098c-e842-da1a-01d2-65d6d064f5cd@si6networks.com>
Date: Thu, 16 Apr 2020 15:22:08 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <158706113942.27424.5328137517371748525@ietfa.amsl.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/hPpVl7HSSINo86caW4cDHdhXmOQ>
Subject: [Ntp] Fwd: New Version Notification for draft-ietf-ntp-port-randomization-02.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 18:22:35 -0000
Folks, FWIW, we have posted a revision according to the recent feedback and the discussion at the interim meeting. We believe this version is ready for WGLC. Thanks, Fernando -------- Forwarded Message -------- Subject: New Version Notification for draft-ietf-ntp-port-randomization-02.txt Date: Thu, 16 Apr 2020 11:18:59 -0700 From: internet-drafts@ietf.org To: Miroslav Lichvar <mlichvar@redhat.com>, Guillermo Gont <ggont@si6networks.com>, Fernando Gont <fgont@si6networks.com> A new version of I-D, draft-ietf-ntp-port-randomization-02.txt has been successfully submitted by Fernando Gont and posted to the IETF repository. Name: draft-ietf-ntp-port-randomization Revision: 02 Title: Port Randomization in the Network Time Protocol Version 4 Document date: 2020-04-16 Group: ntp Pages: 10 URL: https://www.ietf.org/internet-drafts/draft-ietf-ntp-port-randomization-02.txt Status: https://datatracker.ietf.org/doc/draft-ietf-ntp-port-randomization/ Htmlized: https://tools.ietf.org/html/draft-ietf-ntp-port-randomization-02 Htmlized: https://datatracker.ietf.org/doc/html/draft-ietf-ntp-port-randomization Diff: https://www.ietf.org/rfcdiff?url2=draft-ietf-ntp-port-randomization-02 Abstract: The Network Time Protocol can operate in several modes. Some of these modes are based on the receipt of unsolicited packets, and therefore require the use of a service/well-known port as the local port number. However, in the case of NTP modes where the use of a service/well-known port is not required, employing such well-known/ service port unnecessarily increases the ability of attackers to perform blind/off-path attacks. This document formally updates RFC5905, recommending the use of port randomization for those modes where use of the NTP service port is not required. Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. The IETF Secretariat
- [Ntp] Fwd: New Version Notification for draft-iet… Fernando Gont
- Re: [Ntp] Fwd: New Version Notification for draft… Steven Sommars
- Re: [Ntp] Fwd: New Version Notification for draft… Miroslav Lichvar
- Re: [Ntp] Fwd: New Version Notification for draft… Steven Sommars
- Re: [Ntp] Fwd: New Version Notification for draft… Miroslav Lichvar