[Ntp] I-D Action: draft-ietf-ntp-port-randomization-02.txt
internet-drafts@ietf.org Thu, 16 April 2020 18:18 UTC
Return-Path: <internet-drafts@ietf.org>
X-Original-To: ntp@ietf.org
Delivered-To: ntp@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 292013A0AE9; Thu, 16 Apr 2020 11:18:59 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
Cc: ntp@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.127.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: ntp@ietf.org
Message-ID: <158706113909.27424.17184181920786337089@ietfa.amsl.com>
Date: Thu, 16 Apr 2020 11:18:59 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/r0WyZwxak5XoYP2HEhIk-NglQ5c>
Subject: [Ntp] I-D Action: draft-ietf-ntp-port-randomization-02.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Apr 2020 18:19:00 -0000
A New Internet-Draft is available from the on-line Internet-Drafts directories. This draft is a work item of the Network Time Protocol WG of the IETF. Title : Port Randomization in the Network Time Protocol Version 4 Authors : Fernando Gont Guillermo Gont Miroslav Lichvar Filename : draft-ietf-ntp-port-randomization-02.txt Pages : 10 Date : 2020-04-16 Abstract: The Network Time Protocol can operate in several modes. Some of these modes are based on the receipt of unsolicited packets, and therefore require the use of a service/well-known port as the local port number. However, in the case of NTP modes where the use of a service/well-known port is not required, employing such well-known/ service port unnecessarily increases the ability of attackers to perform blind/off-path attacks. This document formally updates RFC5905, recommending the use of port randomization for those modes where use of the NTP service port is not required. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-ntp-port-randomization/ There are also htmlized versions available at: https://tools.ietf.org/html/draft-ietf-ntp-port-randomization-02 https://datatracker.ietf.org/doc/html/draft-ietf-ntp-port-randomization-02 A diff from the previous version is available at: https://www.ietf.org/rfcdiff?url2=draft-ietf-ntp-port-randomization-02 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/
- [Ntp] I-D Action: draft-ietf-ntp-port-randomizati… internet-drafts