[Ntp] Antw: [EXT] Re: Benjamin Kaduk's Discuss on draft-ietf-ntp-mode-6-cmds-09: (with DISCUSS and COMMENT)

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Fri, 28 August 2020 06:31 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C92DE3A15A1; Thu, 27 Aug 2020 23:31:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Xba10ZVKfjII; Thu, 27 Aug 2020 23:30:59 -0700 (PDT)
Received: from mx4.uni-regensburg.de (mx4.uni-regensburg.de [IPv6:2001:638:a05:137:165:0:4:4e7a]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83E783A0D62; Thu, 27 Aug 2020 23:30:57 -0700 (PDT)
Received: from mx4.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id E75CA600004E; Fri, 28 Aug 2020 08:30:54 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx4.uni-regensburg.de (Postfix) with ESMTP id D1B346000048; Fri, 28 Aug 2020 08:30:51 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Fri, 28 Aug 2020 08:30:51 +0200
Message-Id: <5F48A499020000A10003AF47@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.2.1
Date: Fri, 28 Aug 2020 08:30:49 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: Hal Murray <hmurray@megapathdsl.net>, kaduk@mit.edu
Cc: draft-ietf-ntp-mode-6-cmds@ietf.org, The IESG <iesg@ietf.org>, "ntp@ietf.org" <ntp@ietf.org>, "ntp-chairs@ietf.org" <ntp-chairs@ietf.org>, odonoghue@isoc.org
References: <noreply@ietf.org> <159847733996.28106.1103367714274362245@ietfa.amsl.com> <20200827090034.87B9840605C@ip-64-139-1-69.sjc.megapath.net> <20200827165937.GQ16914@kduck.mit.edu>
In-Reply-To: <20200827165937.GQ16914@kduck.mit.edu>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/hg9z4aDC1OY8W0N5biS9rmd5poA>
Subject: [Ntp] Antw: [EXT] Re: Benjamin Kaduk's Discuss on draft-ietf-ntp-mode-6-cmds-09: (with DISCUSS and COMMENT)
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Aug 2020 06:31:01 -0000

>>> Benjamin Kaduk <kaduk@mit.edu> schrieb am 27.08.2020 um 18:59 in Nachricht
<20200827165937.GQ16914@kduck.mit.edu>:

[...]
> General crypto best practice is to only use a given key for a single usage
> and with a single algorithm, so my expectation is that the algorithm would
> be assigned/negotiated at the same time that the key and key‑ID are.

While many decisions in the past were made to keep up backwards compatibility,
the encryption type is set up indirectly vie the ntp.keys file. However (AFAIR)
the file is not part of the NTP specification, so for the on-wire protocol
there's no change to get the encryption type. One might guess, however.

Probably this was an omission after the only encryption type (DES) had been
extended to allow MD5 also (in NTPv3 AFAIR). The later on it was still
forgotten.

Looking up the specs I found

"   Key Identifier (keyid): 32-bit unsigned integer used by the client
   and server to designate a secret 128-bit MD5 key." (page 23)

"   Message Digest (digest): 128-bit MD5 hash computed over the key
   followed by the NTP packet header and extensions fields (but not the
   Key Identifier or Message Digest fields)." (page 23)

"   keyid: Symmetric key ID for the 128-bit MD5 key used to generate and
   verify the MAC.  The client and server or peer can use different
   values, but they must map to the same key." (page 32)

Actually I don't understand the part: "The client and server or peer can use
different
values, but they must map to the same key."

All the code in the spec just seems to care about MD5.

Regards,
Ulrich

> 
> ‑Ben
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org 
> https://www.ietf.org/mailman/listinfo/ntp