Re: [Ntp] WGLC comments on draft-ietf-ntp-using-nts-for-ntp-14

Marcus Dansarie <marcus@dansarie.se> Fri, 23 November 2018 21:40 UTC

Return-Path: <marcus.dansarie.nilsson@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30D3A127133 for <ntp@ietfa.amsl.com>; Fri, 23 Nov 2018 13:40:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.649
X-Spam-Level:
X-Spam-Status: No, score=-1.649 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.25, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N6ns0rUj8ySR for <ntp@ietfa.amsl.com>; Fri, 23 Nov 2018 13:40:22 -0800 (PST)
Received: from mail-wr1-x436.google.com (mail-wr1-x436.google.com [IPv6:2a00:1450:4864:20::436]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D72B9124BF6 for <ntp@ietf.org>; Fri, 23 Nov 2018 13:40:21 -0800 (PST)
Received: by mail-wr1-x436.google.com with SMTP id v6so13503413wrr.12 for <ntp@ietf.org>; Fri, 23 Nov 2018 13:40:21 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:references:from:openpgp:autocrypt:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=W2H75o719HXyW+X/Igy2CowbYHWWkp2p7czFPshoRe0=; b=jn8cS1ppiX8gSR9PaOV1A/YeSs7xTyWg8oyVrHnhPVbKWAyIuYlF9/uwSm8yiXQv82 8xe2dL3TG496AjeNBFAyxbY6mvKx8VONcz1uc6t7Xum2CDLnM4Gq7ckWBKRT7m2m/HTA sFNI0GjUOmWRcTaBhNVRWWOQiF32CfNGnwUEC/kb1Ydz5JYoRQYcO4QYNe8knJ2zHab1 PPO6KXicF9cXxNe8iRoMmrOybxMg3LwcUY7OB6DysFS2Kt1pyrs6u0zh7O4Qe9rY40Jv mAF00t/QqJqvSub/pm7tubXsClfu1Co5C98ibXDTFF5c5eaA8+0edZvSbzX+heAUKa3f pFOg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:references:from:openpgp :autocrypt:message-id:date:user-agent:mime-version:in-reply-to :content-language:content-transfer-encoding; bh=W2H75o719HXyW+X/Igy2CowbYHWWkp2p7czFPshoRe0=; b=JI8wDmoRf3j6rharbmstpNDUp3f/kl33tMObSQun05cS7CwuEuDlenCTKMD10c1pGz 6p2knLTNag1YHZ00zi90L0YDBjD0ewigKrLYSLtMyFRpqZdMnzz6Ycvhb1ZEUruAzwRV +ij+WygLMCoUIdaO12t0oUtVMZVB+BpxBylo1T2HNuQjoSMO8gcOjWuUmKhwxNVAYjuk yBA0/nPHM//8Kh0exTG7X3LcbVgq7BnUpii2coa4gPYYu+dAx/I8sC+U8fhDaPV1r0se 6ugrg+dyWSuGAxTt37CriD3G/piy+Ph9lVGHhYMItK5ZUc+86FXHvAu0LpAvEFp5+Yeu zsEg==
X-Gm-Message-State: AA+aEWZdZpRl8uwwCY7OLGsPDoNbZ/tkGMZZPfKTLZZVW2rfRs6w2d+4 IEeS4cbctgch6musEKbqF9I7QdlDS4M=
X-Google-Smtp-Source: AFSGD/WoH6R5RKnBUywP4a1hYp+1mCLmsHIffNRtElQc/2T/KHS3htHuW26VJow6lFY32+NjitbZOw==
X-Received: by 2002:adf:e608:: with SMTP id p8mr15534246wrm.166.1543009219774; Fri, 23 Nov 2018 13:40:19 -0800 (PST)
Received: from [172.20.7.96] (p5097b0bf.dip0.t-ipconnect.de. [80.151.176.191]) by smtp.gmail.com with ESMTPSA id m80sm9461108wmd.35.2018.11.23.13.40.17 for <ntp@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 23 Nov 2018 13:40:18 -0800 (PST)
Sender: Marcus Dansarie <marcus.dansarie.nilsson@gmail.com>
To: ntp@ietf.org
References: <db984964-799a-4c06-ceaa-ca96e9ba5d3b@dansarie.se> <fdf553a3-ae9a-2eeb-248a-2fccbde6f33e@dansarie.se> <AM4PR0801MB2738A77F79B507E58F57ABC8F8DB0@AM4PR0801MB2738.eurprd08.prod.outlook.com> <OFC09999EE.41B1F790-ONC125834E.0031515A-C125834E.0031D5FD@ptb.de>
From: Marcus Dansarie <marcus@dansarie.se>
Openpgp: preference=signencrypt
Autocrypt: addr=marcus@dansarie.se; prefer-encrypt=mutual; keydata= mQINBFawEn4BEAC8YukDy8f3eczlE8WAcuctrjsNltPCLZDzcj3vBmiayXlXuPULOopqeuw4 +oaZqj4KqvdFBA1mzvwPll7IHePuwAoJYJr48IbIXc9MRjtLoFtd0KnhiVPUS8F2cmfzSJ8E FEv92sz6UT8/tlLEu6sNqr6/caYUivspuW5wf4f6nkSE+6rao9Nx9X03r289IPNBSZv+Y/Ym jWHDPpbT8WLUJZ+A8RsW/1oza609oAzqTkclmnRzip8wZZWNg3Q55P7onBmTIOrEz13My9r5 DWCMHyxXgFL1RJ9YW0t4yRkRm+HvOn3Vesk3m8CCGA6esHV0IPZmBOxJr3l+UQYuDiTgFufr WMpu5MvlyKGHS4fNd505DyyJY2G6eQLLrOq3nZy4qoZSL42TMxzYglexg+H6P/YsIIShk5Ch h/hNphXjrElDWhbGT5JiRWIivgSj/gq5QVBbDLR3b25n9PA0byGemfcEHLkii6EKyH7GW6v9 sgmvCmPfEfppYcOP2g9Jdt8RPitx0UBjoCzWAn0Py0NvlFDyz0FQhWDPig3yo1CG5ljb686v VBwcHJthczUV0rIyVzfmnikIb9ZjydHSX3fFwLz1IcIIX+INS58qA0SDqOoyP2WTYGZCDPVw GMMh+wMtAL2MICTr6vybFWB58m4PsI1j8Ri+AQiEkxyJauI2WQARAQABtCRNYXJjdXMgRGFu c2FyaWUgPG1hcmN1c0BkYW5zYXJpZS5zZT6JAkUEEwEIAC8CGwMCHgECF4ACGQEJCwkNCAwH CwoEBhUKCQgLAgUWAwIBAAUCWkqmHAUJBXvHHgAKCRAvY+f+raTwY6zwD/sEuXIeNbM8hhBr E5LMZFFhpVKzbToKlPifWO9SbChgDkSYx4SqrLqwD1oA6DkDK5NHO/Jj++QCN68jaOCIsT8v n++1mxHRWxEzC65I/WTLAxeLBswm9qfdpObC9ZXNSdyN+AXqzzTJR/GpUawDVe6Cc0RlYaFT 4crQHFNKYJ6lh7/xiDzWghsSKL2DuZzGdcxkMhMYFcHo26OK91OlykdfpwRT4Oe59QhBuzp+ +d76B5lCYD0QBcDRlj1pexgOcSYHPvwsdBsDL7CxHpmeEQe9RmGsGEwV+PEgXGzJr8YpSXVz 5dCR8bRAjmJZFnfiB98L1aO7lz/1Mp+OgS4vkNLLzbB4absm+Mw/s5mwDsVu3982ywJX5qoj yYySvN7YOEloUQ90aNwqMZ7s2J0rEdUvHtHLXUv5ZHwhYWt9XENiVyPyrAT58VDtHorQzBqg mj0jgaQPOBrGw6Ow1RyL046e1mYiwZYHbHoECejDCuUVQZsb8NJnKxf39YIeM02vSD3+oSfG wcEomD569XdUYqq/Y2dR7s34eteyFEQtUTZ/qRMU5x/Fw3M5zMwWEPVK7uRXySxp+jxXg3YY wNjcWC0h+YEpdhZOoWyfdaP4ZXWQSZu3wj0USsX0Ld2t7lHBkr7xm2TDU9wtH7dQwBcmIGUO T+3GvA/bGbIj1hAZNUV3q7kCDQRWsBKsARAApSTo9czkEzERsyyv9PLRHcEeBMAQ4ljXItCb Y0+fcbSXZRro7n//cJLfYUSIgC6rfFNLx8As5sVUzxLnnsL+NFjq2ic8w7+jgVyWTHhfiDdf whq2XJ/KyxvSdQsslX/oAsVFF5qUA5RPdYmDAeIn43U004s0Z1WDkIeeE1dMsoi9m5/mXS/D WDaVG6aBtr6aZbbdDV7/Ym/Vj7oPUPEsd9wpJAo9xRySx3h6qOgJBU6QXUp+vxM7PmR6boTQ h7a2coiTotmGfBM6bsQ8FYxy4fIl7tGppV0hj+cAOzKTRLaJoRsN21K92gXHp30uLv0RN1f8 vr12nt9y7VZmh+7JYtEpqz/IlMZJLNqo7Uultmv6hcZRyvxVwQoTSBtLkUTrw5SLnYOlB80J SuJgXa2hs+HrXw6bDQF9MebLMQU2hayZWc/d+Rjy0bIOKOX/hWHEKyGRorHwpoh/K3RdW5M+ OdPzsn80u5UwqMXoszp5WplcFAk361mof5fAV4D/4mOipWxqX6+2lWLwOXu3z3u7kasz7Mau 6S+9q96f05Dbj7Se3G0oTffae7/79/Ek0ieI288tlizARcOXSSO917UhlNoP74mYFX5eE66O F3mDBfxZkQ4mHHfhqbg6AfoPjSWKRkRp6+PhoFpfVGApzdUxPS0qb3ob7yjLxqotFNRDTlMA EQEAAYkERAQYAQgADwIbAgUCWH7TMwUJA5rcBwIpwV0gBBkBCAAGBQJWsBKsAAoJEMEIAA7D 4SHmu1gP/A15k6i/7SvCGzN8P4hj18jioVSO6IpZHTp8nrQdXtxK2QNbpa2sX42RQDAfkbTK sD6LPIj3C1Hivk5bmu49ZNFsfE6awt9GeqHh0pTq4K+2gv4s3MAzI85GJmTOiY5ooA922JWA QJW6kuwCkOXi0jaGkxgqZ5NW56yxdrzegY6Ly5AYr8znsqjPbQo98uW0kGwJw7Ch8JR1uZo8 6U38Oyk5oh4tbM3upvenMC5SW0EK9UjdVGCq9+HolKIbJpJR+OCF9u3PS4CVnjBJ8dfb4jD7 X/2aUSVmOQLLpCDEJvW8yoZLDm7n3poZWbubbNUYufj/GGkU1vEdTBat78AAy0lHkBIrdyrZ q7VTas6Nrd+tF/My4GpOtAZv45wJp6xo6yx3u35GYMp+/S7jTPqWz0zNq/4EJfN86dvcc0CA kTkL/EClOx3GGfkFmjEfLw3Y9zR6ZZ7okjlQM+Uqm7AfokMqstqgeETsbLZTqKKdByAjkgQR rzCbChZ+SNTmmFNtlUcn7JM55lZxsm3IUhfXx9vPKtlaC6jURYe5u/fcqpuInqSWl+DlyHAp dZkiUuZuK+kO/QpHJuTkYH5fzc6l4Af10pPeS9y7qaJ2mmMXNqRIiJqhIkNL2NypBgSJEbvW WcPtB0KiqNt8dmHwdcZhJt6cPOKxYhGi4ayKY7J5JpfpCRAvY+f+raTwY+2QD/sEqt/Mi8Uq LlPJV7NBnXa8APBMyTISLha5pKH68qtvRQy7acTTxHmau3ZA1qUdRyfxwEEZIvubljSSAzPW yYycwLmLaeTBuquEY7UAsPkc3rV9y4ZNXoAZzSz30FpzM6AcZmSzUvNzes+X6hHJf8VmN4Oj GWGmGbRAmo74AyXzIFQxTqREkJ1kPwHR8Rt3lPgtY4Dhj77G0Mk/rzTZvVPPszS2yZ2If3Qq ZIM8FsbgDt6i01ekWR7rVgycKiFhQBUo4b20BbeZmeaZ+xUPqvZMsOOnUz7XZT819sLT6UV9 nZzZ+KmCAzfqu86xtf/q2GHmfcW2F6S3Q1ShaVtWKIVHuj7Y5RfxX2vg7ZkeRKVDzYfcYWv1 dZgpQmilVmIEp0RkNvRWsTaoBOuFos3gTMr+N2ET6UrmqqIlbHZBZQEpv9+L2+ZxqNNj4MTt 4amI2iLGihwfTwMHKKZxIqISzMER80nKFVgzQpZDXnQQMzCIkJF1Cilyxlw5wYqFoyRUmZ+W kmKxD6mmVRN4rmxdQevmRfMsNb3gFhK3bYQQU4sCtUbQvDNQkb+vikYFKsMXNp0x+RHTdqz7 a2b2J2QKOsWSYYSo9XXdWBn6FiF9nz45C55FDtXQZAW9ba3JlNTw8F8AG4ig77wCdSMqfoYV My+3MEoEMbfOzqc8l4iD3063AYkERAQYAQgADwIbAgUCWkqmOAUJBXvHDAIpwV0gBBkBCAAG BQJWsBKsAAoJEMEIAA7D4SHmu1gP/A15k6i/7SvCGzN8P4hj18jioVSO6IpZHTp8nrQdXtxK 2QNbpa2sX42RQDAfkbTKsD6LPIj3C1Hivk5bmu49ZNFsfE6awt9GeqHh0pTq4K+2gv4s3MAz I85GJmTOiY5ooA922JWAQJW6kuwCkOXi0jaGkxgqZ5NW56yxdrzegY6Ly5AYr8znsqjPbQo9 8uW0kGwJw7Ch8JR1uZo86U38Oyk5oh4tbM3upvenMC5SW0EK9UjdVGCq9+HolKIbJpJR+OCF 9u3PS4CVnjBJ8dfb4jD7X/2aUSVmOQLLpCDEJvW8yoZLDm7n3poZWbubbNUYufj/GGkU1vEd TBat78AAy0lHkBIrdyrZq7VTas6Nrd+tF/My4GpOtAZv45wJp6xo6yx3u35GYMp+/S7jTPqW z0zNq/4EJfN86dvcc0CAkTkL/EClOx3GGfkFmjEfLw3Y9zR6ZZ7okjlQM+Uqm7AfokMqstqg eETsbLZTqKKdByAjkgQRrzCbChZ+SNTmmFNtlUcn7JM55lZxsm3IUhfXx9vPKtlaC6jURYe5 u/fcqpuInqSWl+DlyHApdZkiUuZuK+kO/QpHJuTkYH5fzc6l4Af10pPeS9y7qaJ2mmMXNqRI iJqhIkNL2NypBgSJEbvWWcPtB0KiqNt8dmHwdcZhJt6cPOKxYhGi4ayKY7J5JpfpCRAvY+f+ raTwY8QcD/9XUx8phbJaqpZpIEsay2OsXk0I0MFlmKqgHhi1YgLZoNk6UzqT+/GDrHsBN7lY j5wHtBHLONS7/CbYgyHh1JnuIxRBp2VM4bd7TXpmFpf6fDI4n5JFE5t0ThzXoB8fLY+7Onyl sszvfz83VGEYrmJNKCLKezjvj6JiuUfeImAjT8syGgxXzX+eSjJWegW+nQ/EWqBF6TfqhxgO bb14pbEelbAxdAe6rY+eXsB2B3UNlQz/OPiOykvdi5PCQjhGDI54ogLT7kH5jznouf1zCkC9 NQpHTQVGI/gYR9+VbRAcLKvyiI6it0JA92GZDqmGhmq4GJrHCJfhFW9wh4F0faaHoyqFbOu/ 5gfmfysMoedLx5GAeU03NTedmPs2g4DsAdyh+FdUn/Q5lX/VrsR5IbIO0p0I8E7+A1yE6xNq zDjbBOkxLj3uyOcmx70kQSO9l0H5T+dHUFvJqLzG3BQ6otBB7w8lNlBDTRguUeHNcMhvot1G zJBt++8Jpp1TY3IEuNlMiBpL+iPqgViqyReDsjmVaJbtP/7XM+lZLTM+LVvkFQgt+t3r2NgA ZEj91zKYOsPB1V/0USeGkpoir6BXVPvg2WOunEd3QxkxElNsGH9uxfadNgSS4bn9tib2TGy/ urm1fULsuIOiJR6vMQ1fjjJoPnM8b6dkHSQ7y3+PiPhTpbkCDQRWsBLLARAAyxyKDIPLq3FD 9xQTw/5L3Mw81uxNKpreLKPRJESzDGYmytSi77I639jhTEZf4ktz/OMjX5+tYTfcI2a5xgy2 tlKvGBAOn5anwCTtQ1CUG1EiN1w+qYAQXOAb04/sh/swlkx5ZV3jvJshhQqiG5N0WDAlIXzR /4MYsuMhyHJVlu/JlZJAogDF9q+ZmvUI0RVhfKsvvnastUH4qdCAloWocU+npw79jbRWIX1C wtG2Wt5/VWvG10+4guEQoyaZz5lGwOEnRXwyLmrylZxhavP4mJVHIDVQsCGDoLbKmPVwU2dD I3bZem1dvPrztuplDFqvnHIABXgPqL/yrWQ2BKxsOr5eRa4aNL2Sa8sYz2QYBE2EwU2C4lKB J+pkTE8AmEJniFVuhMoWhFHXTjzauU7KPRVrQZuakap+2M2h0DiaOkGLnak3KZQX6zp5OTXc v0M44nx3T7ZB3p7i5N41cmE1bqDaXtvl239tscyVruGCpEpS1OpBFHYkKk/e8Xiwdaddh0Rw lIAJqsFzFt93BkGcX03C/saI1MQSDs77yrCWPXotMHyg1aM7AAeKqDTFCUvwlPPauRfSBQhb UfL0DpvpSKRWJFuakdeDSzvfrhe3GOKaQoPwNWcLk0kOLBnO2obaJbuTEmd8D54AKUoSH6eJ mjk2mNY1R+GNRczkM1Ue1yEAEQEAAYkCJQQYAQgADwIbDAUCWH7TMwUJA5rb6AAKCRAvY+f+ raTwY9jcD/49jEB5A1YjXzIfNXhJjFH/7jpL6lk8xfK8dDD6e1OsOEqu6l7Ito+7HrDgn7RV urrWXTehCQ95R/uUeXAErHIVAPWt32lm9umB+lDB8KXL6sh3WbavQdzk4UE/hpOKPDX+assu u7GI3ZXY0UzhsRIz1gw6LoZVUqvYIP8S2y+bfDSWkqjwU5ExAi5cuGH8k/LUIbpdb1ALggia kPi+hXRtfGikiw3UY7LtCv5MjkeWL43Prj0w0kdWyWup+/KunI3DsjcvSVvr1nWpuVwQm8WA FfOf85+qL8ACB+2aknGuHot948UcJvSaTbYMFk0HPUVDfDPpUlBmVMZft1Akxa2EGK877uM6 +gC9roB7BF8b/CyEx3QnpvDK53iCns1qaLjL3P8sRJF+K7bHJm0k58BpDH5Yg1Ia8h4ihPEs U0FQznREdR28xsFHzC7NfdDhYTCRNFee4AVB3MDmfdBOiPprAhusSa/h2Q1w3GjBQtI30Pr2 ZaVl9TVvFE/uIQtheW8MQgRgSOqwV6JVg8Cu/Tt+88C2ngLGAp2ty6rZ6xUcKr1gup/OkX8o MIwDmFFKrnz9GBEBh6FHBz27wHANojHN6KJAPRpIY1SClBxIn/vkGdhlL9cgQgieMP3LixbQ BdBhTJWHjiWh+HZzuFuLkh+wpraJEbvsmPPMSPfnjsMrmokCJQQYAQgADwIbDAUCWkqmOAUJ BXvG7QAKCRAvY+f+raTwY1BFD/0e1Vr993CDFGjTJFO24O14xp6JY5L9b80LNqOvBeLnIgF+ HssKxP8Vh0CWCMO7EAA1dAIq8iBzWLlqTQ4xnMuiIXA/y5HP7noVIWNxUBu8tnHZU/1mlN5Z tCE2rLJ8VjN2Wz4zyi0xnKjALkLflmK751YDZvctgRmx3ous1k8LpZwKrzL8NYeLmG5uAENk tz/FI2RLIjijfogdaSvZKBOMe6Gqtb9WdzoMP9kKj6uEqwWUoZB19Jy6rTxB0jjoAwkXvHjT WaoqDlSPyldsDsCXF4FeYOpq53N59yugLl3xN0UUQscAczYdUgONeTL5SY+2ILtwTRgWPO2S SOC88PPHQMK2XhZqCHiVXMU7BYbXGVXqV62/1gpWTw+5IAiIo4LqlWY7oQiuc+BL/z0p0Vap Boexa7rTa3T1ytqhpeQzqDLtkEVlYv+LQ6qB3cRtCNmNAi3nwmzKnElumimz0f9fsbhNMMAC 6DQnksB74rakgyNLZSaCCqt9lb2tPHYF+NPGqFxSW8r62yrRUNx2phvFO2j/B1f0NMm7h7PN qbkNv0b9nQPf2MSYMTavN2EZ4/vfhAfOf07Z55ahpA+zfAfeQvrEPY2JutdET4jpa9xtSuoe S3LbYs7Sy2OUpbmIWM/pCo9OUZsMxbWgn1x1A/LEWElPx4HioOlW6SnYvKOiOw==
Message-ID: <7627646d-d245-40f2-f1a4-b79e9183e235@dansarie.se>
Date: Fri, 23 Nov 2018 22:40:15 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1
MIME-Version: 1.0
In-Reply-To: <OFC09999EE.41B1F790-ONC125834E.0031515A-C125834E.0031D5FD@ptb.de>
Content-Type: text/plain; charset="windows-1252"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/kzP1125m_PVqzGlc2p1MSElwUDM>
Subject: Re: [Ntp] WGLC comments on draft-ietf-ntp-using-nts-for-ntp-14
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Nov 2018 21:40:25 -0000

Hi!

Thank you for your insightful comments. To avoid an exponential increase
in the number of replies, I'm trying to reply inline to all four mails
at once below. Please let me know if I missed something.

I will create pull requests on Github for the suggested changes,
hopefully before Monday.

I am also eager to hear your opinions on my suggested use of DNS SRV
records for clients to find NTS-KE servers. I believe this would greatly
improve the time and breath of adoption of NTS.

Kind regards
Marcus Dansarie

On 2018-11-21 22:18, Dieter Sibold wrote:

>     * In Section 1.1, we would still like resilience to be an express
>     objective of NTS. A possible wording could be "Attacks on or faults in
>     parts of the NTS infrastructure should not completely prohibit clients
>     from performing time synchronization. In particular, security
>     enhancements to the NTP protocol should not increase the protocol's
>     ability to withstand attacks."
>
> The first sentence of your suggestions implies that the clients should
fall back to standard unsecured NTP if there the NTS layer is faulty or
attacked. Is that your intention?
> I support the second sentence (the word increased replaced by decrease).


No, the intention with the suggested text is to make clear that attacks
on the NTS-KE infrastructure shouldn't affect clients that already have
cookies and are performing NTS protected time synchronization with an
NTP server. Obviously, I failed in making that clear. I can revise the
suggested text or we can skip adding this entirely.

On 2018-11-22 17:51, Dieter Sibold wrote:> Hi Marcus,
>     * The security of many other network protocols depends on having a
>     correct perception of time. For that reason, NTP is very attractive as
>     an attack vector. Table I in [1] contains a summary of protocols that
>     depend on correct time for security. I would also like to recommend
>     reading [1] in its entirety as it contains a good summary of
attacks on
>     current NTP, many of which NTS seeks to prevent.
>
> Whereas I agree with this statement I'm not sure if I understand your
intention. Do you want to add language to the draft that recommends the
reading of [1]?

I only meant that point as a general background to my other comments. I
do not propose a reference to [1] in the draft. Sorry if that was unclear.

>     * The security of NTS is entirely dependent on the client correctly
>     verifying the KE-server's certificate and trust chain. This is made
>     clear in Section 9.3, but I believe it is important enough that
Section
>     3 needs to contain a reference there. It could read something
like: "All
>     implementations are REQUIRED to implement the measures described in
>     Section 9.3, as this is critical to the security of the protocol."
>     Furthermore, I think Section 9.3 should have mandatory
requirements for
>     certificate verification. At the very least, this would have a
MUST for
>     following the requirements in RFC 5280 and RFC 6125. There are some
>     other measures that could be added as well, such as requiring
clients to
>     perform OCSP checking (though there could be privacy implications to
>     this) or strictly verifying the OCSP Must Staple flag if it is
present.
>     "Initial" should also be removed removed from the heading of
Section 9.3.
>
> I agree that implementations shall implement the measures described in
9.3. Therefore the REQUIRED is from my point of view ok. I'm not sure if
we should mandate that a client is doing OCSP. I would think this should
be an operational choice. We could formulate this as an recommendation.
Why removing "Initial" from the heading?

I agree that we should be careful with what checks we require clients to
do and that a list of recommendations is probably better. We should try
and find an expert on TLS security who is willing to look over Section 3
and 9.3 and make suggestions. Posting a question on the TLS WG mailing
list could be an idea.

I want to remove "Initial" from the heading to emphasize that
certificate verification should be done every time on every handshake
with the KE server, not just the first one.

>     * If we settle on TLS 1.2 as the minimum requirement, we should only
>     allow perfect forward secrecy (PFS) suites to be negotiated in the TLS
>     handshake. Otherwise, the loss of a certificate private key could
>     theoretically compromise all keys that have been negotiated using that
>     certificate. In the worst case, this could be active NTS keys
belonging
>     to thousands (or more!) of clients.
>
> I'm not able to oversee the implications of this requirement.

I don't see any implications other than that some old or badly
configured TLS 1.2 implementations may not be able to perform a
handshake. If decide to require TLS 1.3, this won't be a problem since
TLS 1.3 mandates PFS cipher suites. For the security advantages, see my
reply to Kristof below.

>     * NTS implementations could be vulnerable to "NTS stripping" attacks,
>     where an attacker fools clients into reverting to plain NTP. Section 9
>     should contain guidance on this. A naive NTS implementation might
try to
>     connect to the NTS-KE port at the NTP server's address and simply
revert
>     to plain NTP upon handshake or connection failure. This would be easy
>     for a MITM attacker to exploit. Having the user explicitly mark a
server
>     as NTS compatible is an obvious mitigation. Another would be to forbid
>     clients from performing unprotected NTP time synchronization with a
>     server it has successfully performed NTS-protected synchronization
with,
>     at least for a certain amount of time (cf. HSTS).
>
>     A more sophisticated attack would be a MITM attacker sending
>     kiss-o'-death packets to the client, forcing it to reperform the
NTS-KE
>     handshake in a way that fails. It is important that clients do not
>     revert to plain NTP here, but instead follow the draft: "As long
as the
>     NTS-KE handshake has not succeeded, the client SHOULD continue polling
>     the NTP server using the cookies and parameters it has." This
could also
>     be used by an attacker with a forged or stolen certificate to force a
>     NTS key renegotiation using that certificate.
>
> This seems to be sound to me. Do you have an proposal to add this to
Sec. 9?

I will write a suggested text and submit a pull request.

>     * In reference to the previous point, we should consider public key
>     pinning as a way for servers to protect against MITM attacks with
forged
>     certificates. The equivalent for HTTPS (HPKP) is specified by RFC
7469.
>     This would require adding new record types to the NTS-KE protocol.
>
> At this stage I wouldn't recommend to add a new record type to the
protocol.

I think you are right. My suggestion then is that we add language to
Section 9.3 mentioning this attack vector and that client
implementations can mitigate it by allowing clients to manually pin
keys. Verification of key fingerprints would have to be performed out of
band. This makes it an implementation issue. Another mitigation would be
to use NTPs support for symmetric message authentication instead of NTS,
preferably the one described in draft-ietf-ntp-mac-05.

>     * In Section 5.7, the paragraphs
>
>     "To protect the client's privacy, the same cookie SHOULD NOT be
included
>     in multiple requests.  If the client does not have any cookies that it
>     has not already sent, it SHOULD initiate a re-run the NTS-KE
protocol."
>
>     and
>
>     "The client MAY reuse cookies in order to prioritize resilience over
>     unlinkability.  Which of the two that should be prioritized in any
>     particular case is dependent on the application and the user's
>     preference.  Section 10.1 describes the privacy considerations of this
>     in further detail."
>
>     should be moved together for obvious reasons. Currently, one is in the
>     beginning of the section and the other at the end.
>
> I would leave the first paragraph as it is because this is important
for the time_request message. The second paragraph provides a choice for
the client (which may be moved to the Security Considerations) which I
wouldn't move at the beginning of 5.7. But to have both of these
statements grouped together we could change the beginning of the second
paragraph to something like "Although the client should not reuse a
cookie it MAY reuse it in  order ...".

Ok. I'll look over the draft and create a pull request with the
suggested changes.


On 2018-11-23 09:57, kristof.teichel@ptb.de wrote:> Hello all,
>> The first sentence of your suggestions implies that the clients
>> should fall back to standard unsecured NTP if there the NTS layer is
>> faulty or attacked. Is that your intention?
>
> If this would be the intention, then I would be against such a paragraph.
> The scenario where a user-level requirement of "ONLY use NTS-secured
> time" prevents the client from making any synchronization makes sense
> and IMO should be possible.

This is not my intention, see my reply to Dieter above.

>> I support the second sentence (the word increased replaced by decrease).
>
> Even here, I would like to know the intention behind this statement.
> I am wary about the case of "attacks" being simply the flipping of a bit
> to achieve a false negative (i.e. changing something in the packet so
> that the MAC portion of the security addendum doesn't check out and
> thereby basically doing denial-of-service)... in this case, I beleive it
> is correct behaviour for the client to not synchronize to faulty
> messages and also not to unsecured messages.
> Basicaly, I'm saying that I think it is okay for our security features
> to introduce new denial-of-service vectors if the alternative would be
> to decrease security requirements.

I too worry about "NTS stripping" attacks. It is clear from both your
and Dieter's comments that my and Ragnar's suggested text did not convey
the idea very well.

>>     * Re Section 3, we still feel that TLS 1.3 should be the lowest
>>     acceptable TLS version. It is certainly true that requiring TLS 1.3
>>     would probably limit short term adaption of NTS. Our opinion,
however,
>>     is that concerns for for the short term should not take priority over
>>     the long term where this could lead to servers having to support
> TLS 1.2
>>     for a long time if TLS 1.2-only client implementations were to emerge
>>     after the draft's adaption as an RFC.
>>
>> I wasn't in favor for this requirement. However, in the meantime RFC
>> 8446 was released and implementations of TLS 1.3 are available now.
>> I therefore agree with you and Ragnar. I would like to learn about
>> Daniel's and Kristof's opinion.
>
> This is a tough one, not least because my knowledge about differences
> between TLS 1.2 and 1.3 is basically zero.
>
> In general terms, I am very wary of going for more long-term benefits at
> the cost of longer time until actual widespread adoption.
> We have basically been using that general strategy for five-and-a-half
> years now, and I have increasing doubts that all of that time was well
> spent:
> There are definitely diminishing returns regarding the increase in
> quality with further effort spent on NTS development, and I think we
> have passed the threshold that I personally find acceptable.
> Keep in mind that from my point of view, the alternative to NTS adoption
> is people running a choice or combination of unsecured associations,
> old-style MACs with symmetric keys and no clear procedure, or (internet
> gods forbid) Autokey.
>
> Further, I don't see how (with the right wording) there could ever be a
> situation in which servers would be forced to support TLS 1.2.
> At worst, there would come a time where a bunch of clients cannot have
> security with the implementations that they have because nobody supports
> it anymore.
> That still does not seem worse than the current situation.
>
> My lack of knowledge regarding the TLS version change prevents me from
> having a qualified opinion.
> For example, I have no concept of how long a restriction to TLS 1.3 only
> would hold back widespread NTS adoption.
> Thus, I don't want my doubts here to get in the way of a decision.
> Daniel, what is your opinion on the matter now undder the new
> circumstances?

TLS 1.3 is a major step forward in that it deprecates many older and
less secure parts of the TLS protocol. It also reduces the number of
round trips for a TLS handshake from three to two (plus TCP
handshaking). In short: better security and higher speed.

I also agree with you that any suggestions or changes at this point
should be small and not inhibit the process of making this draft an RFC.
I do, however, disagree with you when it comes to prioritizing long- or
short-term benefits. I believe that long-term benefits are preferable
over faster NTS adoption in the short term.

Adoption of TLS 1.3 is ongoing with a number of available
implementations, see
<https://github.com/tlswg/tls13-spec/wiki/Implementations>. Facebook
reports that over 50% of their Internet traffic is now secured with TLS
1.3. Also, OpenSSL 1.1.1 with TLS 1.3 support was released in September
and is starting to make its way into Linux distributions.

Regardless of what we choose, we should not let this delay the draft
progress. My preferences are (in order):
* TLS 1.3
* Current wording of Section 3 with the additional requirement that
NTS-KE must offer only cipher suites that have PFS.
* Current wording of Section 3.

>>     * In Section 9.3, it is suggested that clients should "not process
> time
>>     packets from servers if the time computed from them falls outside the
>>     validity period of the server's certificate." We believe that
> there is a
>>     risk that this could be interpreted as meaning that clients should
>>     reperform an NTS-KE handshake upon expiry of the certificate that was
>>     used by the NTS-KE server to provide the client with its initial
> supply
>>     of cookies. In the worst case, this could lead to an accidental DoS
>>     attack as many clients try to perform a new NTS-KE handshake at the
>>     expiry time of a server's old certificate. We suggest adding a
> sentence
>>     like "Clients SHOULD NOT perform a new NTS-KE handshake solely
> based on
>>     the fact that the certificate used by the NTS-KE server in a previous
>>     handshake has expired, if the client has previously received
valid NTS
>>     protected NTP replies that lie within the certificate's validity
> time."
>
> Oof, semantically this is weird territory, especially with the automatic
> key refreshment that we get with the current cookie management.
> What guarantees is the client really basing on the server's certificate?
> In general, authenticity properties are untouched by keys expiring or
> even being lost, as long as the record shows that the authenticity
> statement was made at a time when the key could still be trusted.
> This is not true for secrecy properties though, and I have no initial
> grasp of how later authenticity properties are inherited from earlier
> secrecy properties to comment on how quickly a client needs to build a
> new trust model after a certificate expires (even if we assume that all
> keys associated with a certificate are compromised the instant it
expires).
> Would be an interesting question to do research on, and maybe someone
> already has?

Yes, this is weird. My simple view is that if a client performs a NTS-KE
handshake with a server and correctly verifies the certificate, there is
an implicit guarantee that any subsequent NTS-protected communication is
with the entity that controlled the NTS-KE server during the initial
handshake. I will search around to see if anyone has written something
on situations like this.

I can see two ways that the security guaranteed by the NTS-KE server and
verification of that server's certificate can be compromised:

1. An attacker gains knowledge of the S2C and C2S keys used by a
specific NTP client. If the attacker has recorded the TLS handshake and
then gains access to the server's private certificate key, these can be
recreated. Requiring PFS cipher suites prevents this entirely as this
makes the generated symmetric keys independent of the server certificate
key.

2. An attacker gains knowledge of the cookie encryption key shared
between the NTS-KE and NTP servers. The attacker can then decrypt or
alter any cookies encrypted with that key. My proposed solution to this
is for NTP servers to use a different key for cookies it issues than the
one shared with the NTS-KE server. For example: A NTS server encrypts
the cookies it issues with key A. This key is shared with a NTP server.
When the NTP server receives a cookie encrypted with key A, it returns
new cookies encrypted with key B. Key B is not shared with the NTS
server. If all cookies received from the NTS-KE server have been used
when its certificate expires and a PFS suite was used, all the remaining
trust should be between the NTP server and the client. This solution is
an implementation issue rather than a protocol issue, but it should be
noted in Section 9.

Additionally, an attacker with current access to a NTS-KE server can
obviously access all keys required for an attack.

>> Agree.
>>
>>     * Since there is a current draft that attempts to solve the problem
>>     described in Section 9.4, adding a reference there to
>>     draft-schiff-ntp-chronos-01 could be a good idea.
>>
>> That is a good point.
>
> Is a reference (even an informative one) to an early draft a good idea?
> What is the IETF policy on keeping such a reference updated in something
> that is hopefully soon an RFC?

The text in RFCs is never updated. Maybe a just a more vague reference
to ongoing IETF work on the issue?