Re: [Ntp] NTPv5 draft

Dieter Sibold <dsibold.ietf@gmail.com> Tue, 01 December 2020 09:51 UTC

Return-Path: <dsibold.ietf@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1E4E93A0F2F for <ntp@ietfa.amsl.com>; Tue, 1 Dec 2020 01:51:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1HypOUvpDBtm for <ntp@ietfa.amsl.com>; Tue, 1 Dec 2020 01:51:25 -0800 (PST)
Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F4203A0F2E for <ntp@ietf.org>; Tue, 1 Dec 2020 01:51:25 -0800 (PST)
Received: by mail-wr1-x430.google.com with SMTP id l1so1638244wrb.9 for <ntp@ietf.org>; Tue, 01 Dec 2020 01:51:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=mzjvhdkR9/eLq6uqcUkQwgMIPms4AXfA+NeoHGM5pZM=; b=spj/gC+/KWhncoLLVkBDeCvw9GECCT/WfQ2GBTaNQH1W9Qm78qkH0YFh8xY37XJKcj 1HWT3gYv5oEiZ8+AluDUkG3I+E7QID4eCWN/xvm9XpPzOeResBObeAv+LutYx/xEPRRK 7KIw322Txk8zc26WpEH0P8PMWOYlsDK2llimEKGBF3rWfax7haneiWz4h00fujlPxGJ+ jglGYnGxyuvD2udu8rr2FFP+Zak0PoFXyaaC+2IHbmMkwhZjarrSNKqkGzfAi/XVYMwQ L71ak22CzdsQhkSnSCU98vh5Zci2jr5V93H1Es9h8C4WRqdoqWmdvq2qVBHHIrfR2zVT Wdng==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=mzjvhdkR9/eLq6uqcUkQwgMIPms4AXfA+NeoHGM5pZM=; b=MwHfz4XMBSv/P+cCP7Dq93AdvF4XobV3oQ7s6ril/fzv4aRx+aLgeQgeTCbTLbdLll pXoadFj+FKKjNBsLjMCF1M0EHO7wICQ2H4BfCZO1/PCeiBkC+V1trkHDdFl946t0CymP ikMhdVh6AocNKigIe2e8cMnlGsJGyTIlJ254U2FkwVNC+vHDqrKGG7stACIv15aqq7J7 8ouEjvHXxrOV2jmGB+jlf8GybiuJBv0P6POzRRE+4J68Og/eEZ3wObFR+E9X2nhg0oaj U2lnNE5+Oy7s3ksG6AAGLFW4Pi/nkFSMooeC1tnaQYpM52yZmtZN8qitzj0DMKX2EVdB D+zg==
X-Gm-Message-State: AOAM530z/wxf5AKnz1WS1DL1Ra3SRVn//mLrq5p9TMJ3C8k36Z6zl8d5 3C3QDNIfRpEzSslCJTZe108=
X-Google-Smtp-Source: ABdhPJyTylX/fMu2Mb5lJGmwrIVm9JKYPUs/O1XruZTNBXSsIA0PQVLkAzeplc5vV7tRDjyEjnBfQg==
X-Received: by 2002:a05:6000:151:: with SMTP id r17mr2789664wrx.157.1606816283968; Tue, 01 Dec 2020 01:51:23 -0800 (PST)
Received: from [192.168.111.41] (p200300d17f1f3c001020e98f94a74d6d.dip0.t-ipconnect.de. [2003:d1:7f1f:3c00:1020:e98f:94a7:4d6d]) by smtp.gmail.com with ESMTPSA id p11sm2276996wrj.14.2020.12.01.01.51.22 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 01 Dec 2020 01:51:23 -0800 (PST)
From: Dieter Sibold <dsibold.ietf@gmail.com>
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: ntp@ietf.org
Date: Tue, 01 Dec 2020 10:51:22 +0100
X-Mailer: MailMate (1.13.2r5673)
Message-ID: <2B8C7410-DFA7-4A87-A33E-F50FFA96D0F9@gmail.com>
In-Reply-To: <20201201081203.GB1900232@localhost>
References: <20201111161947.GG1559650@localhost> <AA848C67-CFB7-43FC-B190-FD3911360373@gmail.com> <20201201081203.GB1900232@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/wD5FKezF3vfYnwZ9Ih-NFdbIdNI>
Subject: Re: [Ntp] NTPv5 draft
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Dec 2020 09:51:27 -0000


On 1 Dec 2020, at 9:12, Miroslav Lichvar wrote:

> On Mon, Nov 30, 2020 at 08:12:06PM +0100, Dieter Sibold wrote:
>> 1. Security
>>
>> The protocol as proposed is missing a security approach. There are no
>> mechanisms described to provide authentication, integrity protection 
>> and
>> maybe encryption.
>
> The draft describes a MAC extension field, using the AES-CMAC
> (RFC8573). It also allows all NTPv4 extension field to be used in
> NTPv5, making it compatible with the NTS specification.

Yes, but this pre-shared key approach is not useable outside a closed 
group where the manual key management is feasible. In general you need 
to have an integrated key management like NTS.

>
>> I very much agree with Jame’s proposed draft that a new
>> version of NTP must provide these mechanisms by default.  Sure, you 
>> can add
>> NTS to protect the NTPv5 packets. But in this case protection is 
>> always an
>> optional add-on whereas it needs to be an inherent part of the basic
>> protocol. To achieve this the NTS approach certainly can be 
>> transferred to
>> the basic v5 protocol and packet format.
>
> You mean to require all NTP packets to be authenticated? I don't like
> that idea. The improvements in NTPv5 are orthogonal to authentication.
> NTPv5 is not supposed to be more secure. An NTP client that doesn't
> want to implement the complexity of NTS shouldn't be restricted to
> NTPv4.
>

Yes, I would propose that by default each NTP packet has to be 
authenticated. Not using security should be an active decision! I 
don’t think that security and increased time sync performance have to 
be orthogonal. The 2-step approach could provide better time sync 
performance and security.


>> 2. Interleave and 2-Step
>>
>> I agree with Doug to decide with approach to provide with NTPv5. 
>> Providing
>> both 2-Step and Interleave may increase complexity unnecessarily.
>> Personally, I find that the 2-step approach with the follow-up 
>> message is
>> more concise. And since the first message only need to be very small 
>> (it
>> just needs to contain the information to ensure correlation with the 
>> follow
>> up) the waste of network bandwidth is very small.
>
> If we must to support only one of them, I think it should be the
> interleaved mode.
>
> - It fits better software server implementations, which is what the
>   vast majority of NTP servers seems to be.
> - It is simpler to implement on clients. It doesn't require timeouts
>   for follow-up messages and handling of reordered packets.
> - It is inherently resilient to amplification. No risk of an
>   implementation having a bug in its cookie generation, or leaking
>   key, which would allow attacks.
>
>> 3. Traceability
>>
>> It would make sense that the v5-packets optionally provide 
>> information about
>> the uncertainty of the timestamps taken. These formally for 
>> establishing
>> traceability.
>
> Isn't that the NTP root delay and dispersion? Together they provide an
> estimate of the maximum error in the receive and transmit timestamp.

Uncertainty and maximum error are different. The uncertainty interval 
will always be smaller or equal to the max. error.

>
>> Additionally, in order to maintain traceability during the
>> time period in which leap smearing is applied the client needs to 
>> obtain the
>> necessary information to calculate the offset between UTC and smeared 
>> time.
>> This also is mandatory to maintain traceability.
>
> The smearing offset is provided in the Timescale Offset field.

Thanks.

>
> -- 
> Miroslav Lichvar