Re: [Ntp] I-D Action: draft-ietf-ntp-roughtime-08.txt

Hal Murray <halmurray@sonic.net> Sun, 22 October 2023 23:20 UTC

Return-Path: <halmurray@sonic.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AD2DBC15108B for <ntp@ietfa.amsl.com>; Sun, 22 Oct 2023 16:20:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dNSrmS_mR5f0 for <ntp@ietfa.amsl.com>; Sun, 22 Oct 2023 16:20:42 -0700 (PDT)
Received: from c.mail.sonic.net (c.mail.sonic.net [64.142.111.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CF341C17C51D for <ntp@ietf.org>; Sun, 22 Oct 2023 16:20:02 -0700 (PDT)
Received: from 107-137-68-211.lightspeed.sntcca.sbcglobal.net (104-182-38-69.lightspeed.sntcca.sbcglobal.net [104.182.38.69]) (authenticated bits=0) by c.mail.sonic.net (8.16.1/8.16.1) with ESMTPSA id 39MNK0aQ021411 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Sun, 22 Oct 2023 16:20:01 -0700
Received: from hgm (localhost [IPv6:::1]) by 107-137-68-211.lightspeed.sntcca.sbcglobal.net (Postfix) with ESMTP id D053B28C245; Sun, 22 Oct 2023 16:20:00 -0700 (PDT)
X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.8
To: Watson Ladd <watsonbladd@gmail.com>
cc: Hal Murray <halmurray@sonic.net>, ntp@ietf.org
From: Hal Murray <halmurray@sonic.net>
In-Reply-To: Message from Watson Ladd <watsonbladd@gmail.com> of "Sun, 22 Oct 2023 11:42:58 -0700." <CACsn0c=rdBJL0Y2fcERuf9C4wEr-KHpsQj39ksGThKzJ2nUG3Q@mail.gmail.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Sun, 22 Oct 2023 16:20:00 -0700
Message-Id: <20231022232000.D053B28C245@107-137-68-211.lightspeed.sntcca.sbcglobal.net>
X-Sonic-CAuth: UmFuZG9tSVa6OsvFBd9CXTcRlopkAqN3x6S/RN4xdpoxyh7FRfSGOmAtPq3f0wgqYOF8AYXJd7a0MSOxVj30olMgN6vEGU8YEvPkWLwF9eE=
X-Sonic-ID: C;Asz1hTFx7hG2vkeIR+6Zsg== M;OO0MhjFx7hG2vkeIR+6Zsg==
X-Sonic-Spam-Details: -1.5/5.0 by cerberusd
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/tC1O2Yv_7KgyRNIyPvdjU10HML4>
Subject: Re: [Ntp] I-D Action: draft-ietf-ntp-roughtime-08.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Oct 2023 23:20:44 -0000

watsonbladd@gmail.com said:
> Thanks for taking a look. I agree there are two different things here, but we
> can split later as an editorial matter. When it was originally split the
> second bit was too ambitious and small, and got neglected by the editor (me).
> It also had some issues with getting the envisioned environment off the
> ground, hence the much sparser text here. 

Well, I'd encourage you to do the split now.  I think that would help each 
document focus on the issues that are important for it.  Move everything about 
proof to the second document.  Simplify the RoughTime as much as possible.

> I think we need both. Unless we're willing to completely trust a server to
> give us the time. 

NTP is already setup to use 3 servers and ignore a bad one.



> The webPKI makes design decisions that are incompatible with what you're
> suggesting. We would need to pin end entity certs, which is discouraged and
> they have 90 day or less lifetimes. Revocation information isn't published
> after expiry

Right.  I think the critical issue is lifetime.  I didn't say it, but I was 
assuming that we would setup self-signed certificates with a long lifetime.  
Are there any sanity checks in TLS software that reject certificates with 
super-long lifetimes?

The idea is not to pin one of the webPKI certificates but to use one of our 
own and distribute it outside of their setup the same way you are going to 
distribute your keys.  That lets us use the already deployed NTS/TLS software.


[How to find trusted servers and their keys]
> That's the sort of policy design we kick to vendors, akin to PKIX vs. WebPKI
> (CAB forum, dev-security-policy, etc). 

I think it's more complicated than that.  Where are the vendors going to get 
the data?

Somebody has to setup and run the servers and somebody (maybe more than one) 
has to vet the servers, keep track of the ones they like, and distribute a 
list of them and their keys.

--------

If you are using UDP, you need to make sure the request is as long as the 
response in order to avoid amplification on DDoS attacks.  That may require 
padding on the request.

-- 
These are my opinions.  I hate spam.