Re: [Ntp] Details of the fragmentation attacks against NTP and port randomization

Fernando Gont <fgont@si6networks.com> Fri, 07 June 2019 11:05 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07E621202B7 for <ntp@ietfa.amsl.com>; Fri, 7 Jun 2019 04:05:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Oip62jVyJ0F for <ntp@ietfa.amsl.com>; Fri, 7 Jun 2019 04:05:12 -0700 (PDT)
Received: from fgont.go6lab.si (fgont.go6lab.si [IPv6:2001:67c:27e4::14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA1D1120254 for <ntp@ietf.org>; Fri, 7 Jun 2019 04:05:09 -0700 (PDT)
Received: from [192.168.1.48] (unknown [85.105.205.250]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id CA5A18EDEA; Fri, 7 Jun 2019 13:05:07 +0200 (CEST)
To: Danny Mayer <mayer@pdmconsulting.net>, ntp@ietf.org
References: <CAN2QdAGS20q=7+r+qMFEBBu4gNmSDR9-vYDbvgC=ZnqWLEU-6w@mail.gmail.com> <739c2eaa-05f1-0b30-4b64-fc5d3f91ce5b@pdmconsulting.net> <a3a545cf-d83d-a2c7-ad6c-3e349de78615@si6networks.com> <9f75e400-cf2f-053f-ed06-f4d6df415eaf@pdmconsulting.net>
From: Fernando Gont <fgont@si6networks.com>
Openpgp: preference=signencrypt
Autocrypt: addr=fgont@si6networks.com; prefer-encrypt=mutual; keydata= mQINBE5so2gBEACzBQBLUy8nzgAzSZn6ViXT6TmZBFNYNqTpPRvTVtUqF6+tkI+IEd9N2E8p pXUXCd0W4dkxz6o7pagnK63m4QSueggvp881RVVHOF8oTSHOdnGxLfLeLNJFKE1FOutU3vod GK/wG/Fwzkv9MebdXpMlLV8nnJuAt66XGl/lU1JrNfrKO4SoYQi4TsB/waUQcygh7OR/PEO0 EttiU8kZUbZNv58WH+PAj/rdZCrgUSiGXiWUQQKShqKnJxLuAcTcg5YRwL8se/V6ciW0QR9i /sr52gSmLLbW5N3hAoO+nv1V/9SjJAUvzXu43k8sua/XlCXkqU7uLj41CRR72JeUZ4DQsYfP LfNPC98ZGTVxbWbFtLXxpzzDDT8i3uo7w1LJ2Ij/d5ezcARqw01HGljWWxnidUrjbTpxkJ9X EllcsH94mer728j/HKzC9OcTuz6WUBP3Crgl6Q47gY5ZIiF0lsmd9/wxbaq5NiJ+lGuBRZrD v0dQx9KmyI0/pH2AF8cW897/6ypvcyD/1/11CJcN+uAGIrklwJlVpRSbKbFtGC6In592lhu7 wnK8cgyP5cTU+vva9+g6P1wehi4bylXdlKc6mMphbtSA+T3WBNP557+mh3L62l4pGaEGidcZ DLYT2Ud18eAJmxU3HnM8P3iZZgeoK7oqgb53/eg96vkONXNIOwARAQABtCVGZXJuYW5kbyBH b250IDxmZ29udEBzaTZuZXR3b3Jrcy5jb20+iQJBBBMBAgArAhsjBQkSzAMABgsJCAcDAgYV CAIJCgsEFgIDAQIeAQIXgAUCTmylpQIZAQAKCRCuJQ1VHU50kv7wD/9fuNtTfxSLk3B3Hs3p ixTy8YXVjdkVwWlnJjFd7BOWmg7sI+LDhpjGfT6+ddOiwkumnvUZpObodj4ysH0i8c7P4C5t F9yu7WjklSlrB5Rth2CGChg5bKt541z2WHkFFxys9qBLmCSYDeKQkzLqhCjIUJizY2kOJ2GI MnSFDzJjhSFEh//oW830Y8fel1xnf/NVF+lBVtRMtMOfoWUqDjvP3sJ1G4zgkDCnF0CfncLx +hq2Mv26Uq9OTzvLH9aSQQ/f067BOkKAJKsfHdborX4E96ISTz57/4xECRSMr5dVsKVm4Y// uVIsb+L5z+a32FaiBZIAKDgnJO7Z8j6CV5e5yfuBTtX52Yi9HjYYqnYJGSDxYd6igD4bWu+7 xmJPHjkdqZgGV6dQIgiUfqkU+s5Cv350vK48CMaT/ZLo2BdsMhWsmaHmb+waePUMyq6E4E9x 9Js+EJb9ZiCfxS9exgieZQpet1L36IvhiwByvkQM009ywfa30JeMOltUtfLi5V06WQWsTzPL 5C+4cpkguSuAJVDTctjCA0moIeVDOpJ8WH9voQ4IeWapQnX35OIoj1jGJqqYdx65gc1ygbyx b8vw+pJ9E5GLse5TQnYifOWpXzX9053dtbwp/2OVhU4KLlzfCPCEsoTyfu9nIZxdI2PMwiL5 M85BfjX4NmwBLmPGoLkCDQRObKNoARAAqqXCkr250BchRDmi+05F5UQFgylUh10XTAJxBeaQ UNtdxZiZRm6jgomSrqeYtricM9t9K0qb4X2ZXmAMW8o8AYW3RrQHTjcBwMnAKzUIEXXWaLfG cid/ygmvWzIHgMDQKP+MUq1AGQrnvt/MRLvZLyczAV1RTXS58qNaxtaSpc3K/yrDozh/a4pu WcUsVvIkzyx43sqcwamDSBb6U8JFoZizuLXiARLLASgyHrrCedNIZdWSx0z0iHEpZIelA2ih AGLiSMtmtikVEyrJICgO81DkKNCbBbPg+7fi23V6M24+3syHk3IdQibTtBMxinIPyLFF0byJ aGm0fmjefhnmVJyCIl/FDkCHprVhTme57G2/WdoGnUvnT7mcwDRb8XY5nNRkOJsqqLPemKjz kx8mXdQbunXtX9bKyVgd1gIl+LLsxbdzRCch773UBVoortPdK3kMyLtZ4uMeDX3comjx+6VL bztUdJ1Zc9/njwVG8fgmQ+0Kj5+bzQfUY+MmX0HTXIx3B4R1I1a8QoOwi1N+iZNdewV5Zfq+ 29NlQLnVPjCRCKbaz9k6RJ2oIti55YUI6zSsL3lmlOXsRbXN5bRswFczkNSCJxJMlDiyAUIC WOay7ymzvgzPa+BY/mYn94vRaurDQ4/ljOfj6oqgfjts+dJev4Jj89vp8MQI3KJpZPEAEQEA AYkCJQQYAQIADwUCTmyjaAIbDAUJEswDAAAKCRCuJQ1VHU50km4xEACho45PZrUjY4Zl2opR DFNo5a6roTOPpgwO9PcBb3I5F8yX2Dnew+9OhgWXbBhAFq4DCx+9Gjs43Bn60qbZTDbLGJ/m 8N4PwEiq0e5MKceYcbetEdEUWhm5L6psU9ZZ82GR3UGxPXYe+oifEoJjOXQ39avf9S8p3yKP Diil0E79rn7LbJjMcgMLyjFg9SDoJ6pHLtniJoDhEAaSSgeV7Y745+gyMIdtQmrFHfqrFdjq D6G0HE+Z68ywc5KN67YxhvhBmSycs1ZSKAXv1zLDlXdmjHDHkU3xMcB+RkuiTba8yRFYwb/n j62CC4NhFTuIKOc4ta3dJsyXTGh/hO9UjWUnmAGfd0fnzTBZF8Qlnw/8ftx5lt4/O+eqY1EN RITScnPzXE/wMOlTtdkddQ+QN6xt6jyR2XtAIi7aAFHypIqA3lLI9hF9x+lj4UQ2yA9LqpoX 6URpPOd13JhAyDe47cwsP1u9Y+OBvQTVLSvw7Liu2b4KjqL4lx++VdBi7dXsjJ6kjIRjI6Lb WVpxe8LumMCuVDepTafBZ49gr7Fgc4F9ZSCo6ChgQNLn6WDzIkqFX+42KuHz90AHWhuW+KZR 1aJylERWeTcMCGUSBptd48KniWmD6kPKpzwoMkJtEXTuO2lVuborxzwuqOTNuYg9lWDl7zKt wPI9brGzquUHy4qRrA==
Message-ID: <70d86938-5d50-7732-5257-c698d7d308d6@si6networks.com>
Date: Fri, 07 Jun 2019 13:53:22 +0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <9f75e400-cf2f-053f-ed06-f4d6df415eaf@pdmconsulting.net>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/p4DFHSivm1OLvdtOTthJbNszYKQ>
Subject: Re: [Ntp] Details of the fragmentation attacks against NTP and port randomization
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jun 2019 11:05:19 -0000

On 5/6/19 05:41, Danny Mayer wrote:
> On 6/4/19 2:39 AM, Fernando Gont wrote:
>> On 4/6/19 06:09, Danny Mayer wrote:
>>> On 6/3/19 2:24 PM, Watson Ladd wrote:
>>>
>>>> Dear all,
>>>>
>>>> The debate over client port randomization is missing an important
>>>> fact: off-path attacks against NTP are not prevented by the origin
>>>> timestamp due to the OS handling of fragmentation. In
>>>> http://www.cs.bu.edu/~goldbe/papers/NTPattack.pdf we see that sending
>>>> a properly crafted IP fragment can selectively overwrite NTP packets,
>>>> thus allowing an attacker to modify received data without overwriting
>>>> the origin timestamp. I would recommend we adopt port randomization
>>>> to handle this problem.
>>>>
>>>> Sincerely,
>>>> Watson Ladd
>>> Actually if you read Section VI you will see that the last sentence of
>>> that section states that they do not consider it to be a sufficient defense.
>> Wasn't Your argument that the timestamp was enough to mitigate off-path
>> attacks?
>>
> Yes and no. The draft you wrote requires using random ports to avoid
> off-path attacks.

No.

The draft we wrote says employing predictable identifiers is a bad
practice that has been known for over 20 years. We have been on this
road so many times. You just don't use predictable IDs.

Using them leads to trouble, with no benefit. Using random port numbers
helps mitigate such trouble.



> The paper demonstrates that for at least some O/S's an
> off-path fragmentation attack succeeds regardless of the port number.
> This is at a layer below NTP. So randomizing the ports doesn't matter
> for this attack according to the paper. The proper way to deal with this
> fragmentation attack is to fix the underlying O/S behavior as has
> already been done for most of them. The NTP basic payload is only 48
> bytes so there is no reason to allow fragmentation in the first place.

The IPv4 minimum MTU is 68 bytes. Anything longer than that may need to
be fragmented.



> If you can't attack that way then your off-path attacker cannot guess
> the origin timestamp which is a 64-bit quantity. Furthermore the
> attacker doesn't know the server being used by the NTP client so the IP
> address of that server will be invalid as well. 

In many-many cases, the possible NTP servers are known. We have been
dicussiing this sort of thing *for ages* in the transport area. See e.g.
RFC5927




> So RFC6056 doesn't really apply as a mandate.

It's a BCP from the *transport area* about how to employ ephemeral port
numbers. I can't see what's the rationale to ignore such advice.



> You can certainly ask to
> update draft-ietf-ntp-bcp to recommend randomizing the port for outgoing
> queries.

Yes. That's what our draft does.



> In any case RFC6056 is about randomizing ports and is not
> really a security document. If it were then it would have made a very
> basic recommendation concerning the port: if you have received your
> response and it is valid then close the port immediately and the next
> time you want to make a new request open a new random port to perform
> the request. That way the off-path attacker will have no way of knowing
> what the new port number will be.

The document provides advice for all transport protocols. What you
describe only applies for connection-less protocols, where the app-layer
only does occasional packets exchanges.



> In the case of NTP you don't want to trust a single server, The draft
> NTP BCP recommends at least 3 different servers and preferably 4 to
> allow for the loss of one server.

You keep mixing things up.

There's a lot of things you may want to do (and probably should!) at the
app layer. This document is concerned with what you do at the *transport
layer*. Any good practices at the app layer don't rule out good
practices at the transport layer.


You keep arguing that you want to keep a very bad practice, because
somehow you are doing something else that you thing will relieve you
from the possible pain of the bad practice.

Our draft argues: bad practices are bad practices. Do the right thing.



>  See section 3.2. If you are really
> concerned about security you should arrange with your server providers
> to include either a MAC at the end of the packet or use the new NTS
> security mechanism to validate and secure the packets returned. If you
> are concerned about attacks you should be employing firewalls anyway.
> Lastly you can get yourself a GPS unit and use that to get your clock
> information. For the really paranoid, get an atomic clock!

I guess with the same line of reasoning you could argue that if you're
really concerned about security, you wouldn't keep the servers connected
to the Internet?

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492