Re: [TICTOC] Mirja Kühlewind's Discuss on draft-ietf-tictoc-multi-path-synchronization-05: (with DISCUSS and COMMENT)

"Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net> Wed, 19 October 2016 15:41 UTC

Return-Path: <ietf@kuehlewind.net>
X-Original-To: tictoc@ietfa.amsl.com
Delivered-To: tictoc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B4B82129413 for <tictoc@ietfa.amsl.com>; Wed, 19 Oct 2016 08:41:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.333
X-Spam-Level:
X-Spam-Status: No, score=-2.333 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RP_MATCHES_RCVD=-0.431, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 478KXhpgJ7Lv for <tictoc@ietfa.amsl.com>; Wed, 19 Oct 2016 08:41:57 -0700 (PDT)
Received: from kuehlewind.net (kuehlewind.net [83.169.45.111]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 93F501294D0 for <tictoc@ietf.org>; Wed, 19 Oct 2016 08:41:56 -0700 (PDT)
Received: (qmail 8036 invoked from network); 19 Oct 2016 17:34:32 +0200
Received: from p5dec251c.dip0.t-ipconnect.de (HELO ?192.168.178.33?) (93.236.37.28) by kuehlewind.net with ESMTPSA (DHE-RSA-AES256-SHA encrypted, authenticated); 19 Oct 2016 17:34:31 +0200
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: "Mirja Kuehlewind (IETF)" <ietf@kuehlewind.net>
In-Reply-To: <93b40adb8bcf40329f091768d05cb389@IL-EXCH01.marvell.com>
Date: Wed, 19 Oct 2016 17:34:30 +0200
Content-Transfer-Encoding: quoted-printable
Message-Id: <E2DBA15B-393D-4811-8124-7EE198D43211@kuehlewind.net>
References: <147454516251.22463.16980267674502590256.idtracker@ietfa.amsl.com> <93b40adb8bcf40329f091768d05cb389@IL-EXCH01.marvell.com>
To: Tal Mizrahi <talmi@marvell.com>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/tictoc/ByKQCJYHSUDOFnkuXO3GBXFI_nI>
Cc: "odonoghue@isoc.org" <odonoghue@isoc.org>, "draft-ietf-tictoc-multi-path-synchronization@ietf.org" <draft-ietf-tictoc-multi-path-synchronization@ietf.org>, Suresh Krishnan <suresh.krishnan@ericsson.com>, "tictoc-chairs@ietf.org" <tictoc-chairs@ietf.org>, "tictoc@ietf.org" <tictoc@ietf.org>, Watson Ladd <watsonbladd@gmail.com>, The IESG <iesg@ietf.org>
Subject: Re: [TICTOC] Mirja Kühlewind's Discuss on draft-ietf-tictoc-multi-path-synchronization-05: (with DISCUSS and COMMENT)
X-BeenThere: tictoc@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Timing over IP Connection and Transfer of Clock BOF <tictoc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tictoc>, <mailto:tictoc-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tictoc/>
List-Post: <mailto:tictoc@ietf.org>
List-Help: <mailto:tictoc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tictoc>, <mailto:tictoc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Oct 2016 15:41:58 -0000

Hi Tal,

sorry for my very late reply. I was on holidays and am still a little overloaded. Your changes addresses my concerns; especially not describing this as a protocol improves readability and the whole doc. Thanks.

I have two remaining comments (will also put this in my ballot):

1) In the security section you say:

"The security aspects of time synchronization protocols are discussed
   in detail in [TICTOCSEC].“

TICTOCSEC is a reference to RFC 7384 on "Security Requirements of Time Protocols in Packet Switched Networks“. As this RFC species requirements, it would be much more useful to document how these requirements have bee addressed by this proposal rather than just referring to it and leave this exercise to the reader.

2) As this draft is experimental, it would actually benefit from an own section that describes what this experiment is about. Which parts should be evaluated and what are the expected outcomes?

Thanks,
Mirja


> Am 27.09.2016 um 08:59 schrieb Tal Mizrahi <talmi@marvell.com>:
> 
> Hi Mirja,
> 
> Many thanks for the thorough review.
> 
>> A protocol specification should not make this assumption but describe a
>> mechanism how a client gets to know about these IP addresses. However, this
>> draft does not read like a protocol specification anyway; it rather reads like an
>> informational document leaveraging existing mechanisms to use multiples
>> pathes (see further below).
> 
> [TM] I agree that the current draft is not a protocol specification. It describes an approach that uses multiple paths without modifying the protocols. Specifically, the abstract says: "This document describes a multi-path approach to PTP and NTP over IP networks, allowing the protocols to run concurrently over multiple communication paths between the master and slave clocks."
> Looking over the document, I agree that in some cases the document implies that it defines a protocol. Would it address your concern if we revised the text so as not to imply that we are defining a protocol?
> 
> 
>> Further, this draft claims in the abstract that this mechanism could enhance
>> security which is not further discussed (should be added to the security
>> considerations section!). However, I would guess that it depends on the
>> choosen combining algorithm if it enhances security or not (or even worsens
>> it). If so that really needs to be further discussed!
> 
> [TM] Agreed. Actually we received a similar comment from Watson, the SEC-DIR reviewer, and plan to update the text of the security considerations section to the following:
> 
> The security aspects of time synchronization protocols are discussed in detail in [TICTOCSEC]. The methods describe in this document propose to run a time synchronization protocol through redundant paths, and thus allow to detect and mitigate man-in-the-middle attacks, as described in [DELAY-ATT]. It should be noted that when using multiple paths, these paths may partially overlap, and thus an attack that takes place in a common segment of these paths is not mitigated by the redundancy. Moreover, an on-path attacker may in some cases have access to more than one router, or may be able to migrate from one router to another. Therefore, when using multiple paths it is important for the paths to be as diverse and as independent as possible, making the redundancy scheme more tolerant to on-path attacks.
> 
> [TM] Your point about the combining mechanism is well taken, and we propose to add the following paragraph to Section 6:
> 
> The combining algorithm should be chosen carefully based on the system properties, as different combining algorithms provide different advantages. For example, some combining algorithms (e.g., [NTP], [DELAY-ATT]) are intended to be robust in the face of security attacks, while other combining algorithms (e.g., [KALMAN]) are more resilient to random delay variation. 
> 
> 
> Best regards,
> Tal.
> 
> 
> 
> 
> 
>> -----Original Message-----
>> From: Mirja Kuehlewind [mailto:ietf@kuehlewind.net]
>> Sent: Thursday, September 22, 2016 2:53 PM
>> To: The IESG
>> Cc: draft-ietf-tictoc-multi-path-synchronization@ietf.org; tictoc-
>> chairs@ietf.org; odonoghue@isoc.org; tictoc@ietf.org
>> Subject: Mirja Kühlewind's Discuss on draft-ietf-tictoc-multi-path-
>> synchronization-05: (with DISCUSS and COMMENT)
>> 
>> Mirja Kühlewind has entered the following ballot position for
>> draft-ietf-tictoc-multi-path-synchronization-05: Discuss
>> 
>> When responding, please keep the subject line intact and reply to all email
>> addresses included in the To and CC lines. (Feel free to cut this introductory
>> paragraph, however.)
>> 
>> 
>> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>> 
>> 
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-tictoc-multi-path-synchronization/
>> 
>> 
>> 
>> ----------------------------------------------------------------------
>> DISCUSS:
>> ----------------------------------------------------------------------
>> 
>> "Each NTP clock has a set of N IP addresses. The assumption is that
>>     the server information, including its multiple IP addresses is
>>     known to the NTP clients."
>> 
>> A protocol specification should not make this assumption but describe a
>> mechanism how a client gets to know about these IP addresses. However, this
>> draft does not read like a protocol specification anyway; it rather reads like an
>> informational document leaveraging existing mechanisms to use multiples
>> pathes (see further below).
>> 
>> Further, this draft claims in the abstract that this mechanism could enhance
>> security which is not further discussed (should be added to the security
>> considerations section!). However, I would guess that it depends on the
>> choosen combining algorithm if it enhances security or not (or even worsens
>> it). If so that really needs to be further discussed!
>> 
>> 
>> ----------------------------------------------------------------------
>> COMMENT:
>> ----------------------------------------------------------------------
>> 
>> This drafts reads rather like a research paper than an RFC. Especailly saying
>> that "The Multi-Path Precision Time Protocol
>>  (MPPTP) and Multi-Path Network Time Protocol (MPNTP) define an
>>  additional layer that extends the existing PTP and NTP without the
>>  need to modify these protocols. "
>> is completely overstating. I really don't see that this doc defines new
>> protocols or a new layer. I would strongly recommend to not give the
>> describe mechanisms a name (like Multi-Path Precision Time Protocol
>> (MPPTP) and Multi-Path Network Time Protocol (MPNTP)) as these are no
>> protocols. I further recommend to publish this document instead as an
>> informational RFC that describes how to leverages multiple pathes without
>> protocol changes.
>> 
>> Also section 6 that only gives references to other docs would be acceptable
>> for an informational draft but for a protocol spec. A spec should provide an
>> implementation recommendation by provding a default algorithm.
>> 
>> Some editorial commenta:
>> 
>> I would recommend to shorten the abstract by removing or moving the first
>> part, potentially into the introduction instead, and only leave this
>> part:
>> 
>> "This document describes a multi-path approach to the Network Time
>> Protocol (NTP) and the
>>  Precision Time Protocol (PTP) over IP networks, allowing the protocols to
>> run concurrently over
>>  multiple communication paths between the master and slave clocks. The
>>  multi-path approach can significantly contribute to clock accuracy,
>>  security and fault tolerance."
>> 
>> Also section 3 and 4 could be completely removed or shorten to 2-3
>> paragraph that could also be integarted into the introdcution.
>> 
>