[TICTOC] Comments on draft-ietf-tictoc-security-requirements-03

Kevin Gross <kevin.gross@avanw.com> Fri, 16 November 2012 23:02 UTC

Return-Path: <kevin.gross@avanw.com>
X-Original-To: tictoc@ietfa.amsl.com
Delivered-To: tictoc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E59F421F8525 for <tictoc@ietfa.amsl.com>; Fri, 16 Nov 2012 15:02:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.384
X-Spam-Level: *
X-Spam-Status: No, score=1.384 tagged_above=-999 required=5 tests=[AWL=-0.693, BAYES_00=-2.599, FH_HOST_EQ_D_D_D_D=0.765, FH_HOST_EQ_D_D_D_DB=0.888, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, MANGLED_SHOP=2.3, RDNS_DYNAMIC=0.1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IIvfJGk5W3ZR for <tictoc@ietfa.amsl.com>; Fri, 16 Nov 2012 15:02:20 -0800 (PST)
Received: from oproxy12-pub.bluehost.com (50-87-16-10.unifiedlayer.com [50.87.16.10]) by ietfa.amsl.com (Postfix) with SMTP id CF77321F8514 for <TICTOC@ietf.org>; Fri, 16 Nov 2012 15:02:16 -0800 (PST)
Received: (qmail 7232 invoked by uid 0); 16 Nov 2012 23:01:54 -0000
Received: from unknown (HELO host291.hostmonster.com) (74.220.215.91) by oproxy12.bluehost.com with SMTP; 16 Nov 2012 23:01:53 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=avanw.com; s=default; h=Content-Type:To:From:Subject:Message-ID:Date:MIME-Version; bh=Vl7GUyMyeTS9dhDpP7JhITwn4BCEoaGXxinqXZZzOJg=; b=ae/8PqV6dzleBeDIjWyQrrHayympladYfeQw8txVHLGpaEEsO91gPaCH0AxMRMd1Qr+ADgXEimXAxb1zyaCeK1Oa1emfXrIfdwiEbFW/g/NHZ6bSsD2xyR7sLfsyPFKW;
Received: from [209.85.215.172] (port=47675 helo=mail-ea0-f172.google.com) by host291.hostmonster.com with esmtpsa (TLSv1:RC4-SHA:128) (Exim 4.76) (envelope-from <kevin.gross@avanw.com>) id 1TZUv3-0001W4-H4 for TICTOC@ietf.org; Fri, 16 Nov 2012 16:01:53 -0700
Received: by mail-ea0-f172.google.com with SMTP id a1so525350eaa.31 for <TICTOC@ietf.org>; Fri, 16 Nov 2012 15:01:52 -0800 (PST)
MIME-Version: 1.0
Received: by 10.14.213.7 with SMTP id z7mr1369024eeo.39.1353106912094; Fri, 16 Nov 2012 15:01:52 -0800 (PST)
Received: by 10.223.152.201 with HTTP; Fri, 16 Nov 2012 15:01:51 -0800 (PST)
Date: Fri, 16 Nov 2012 16:01:51 -0700
Message-ID: <CALw1_Q0zi7jZGzwESQGfrgOH_+CwgkCfSZZ7yAhQGL1ZhxLcjA@mail.gmail.com>
From: Kevin Gross <kevin.gross@avanw.com>
To: "TICTOC@ietf.org" <TICTOC@ietf.org>
Content-Type: multipart/alternative; boundary="047d7b603bb0d6a8ba04cea4c0b4"
X-Identified-User: {1416:host291.hostmonster.com:avanwcom:avanw.com} {sentby:smtp auth 209.85.215.172 authed with kevin.gross@avanw.com}
Subject: [TICTOC] Comments on draft-ietf-tictoc-security-requirements-03
X-BeenThere: tictoc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Timing over IP Connection and Transfer of Clock BOF <tictoc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tictoc>, <mailto:tictoc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tictoc>
List-Post: <mailto:tictoc@ietf.org>
List-Help: <mailto:tictoc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tictoc>, <mailto:tictoc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Nov 2012 23:02:21 -0000

Thanks for putting this draft together. I found it to be well written, well
organized and very informative. I have some comments.

General:

Use MITM acronym defined in 2.2 instead of spelling it out many times

By sections:

1 - Add playback to the list of attacks when synchronization is compromised.

1 - s/The IEEE 1588 includes/IEEE 1588 includes/

1 - Provide definition or example for "packet timing deployments"

2.1 - s/"protocol packets" is refers/"protocol packets" refers/

3.1 - s/documents/document/

3.1.1 - Authentication and encryption can be used together. s/by an
encryption or an authentication mechanism./by an encryption or an
authentication mechanism or both.

3.1.2 - s/eavesdrop to protocol/eavesdrop on protocol/

3.2 - Other threats to consider:
Rogue transparent clock. A remedy is discussed in 4.1.4 but it is not
documented as a threat.
Rogue boundary clock
Unauthorized receipt

3.2.9 - s/spoof the GPS satellites/spoof GPS satellite signals/

3.3 s/Attacket/Attacker/

Table 1 - Add a couple +'s:
Replay attack can be perpetrated by an external injector
Packet delay manipulation can cause accuracy degradation

4 - Add references for IPsec and MACsec

4.1.4 - Discuss TC authentication can prevent rogue TC from degrading
accuracy. Mention that this whole section is not applicable to NTP.

4.1.5 - Repeats discussion in 4.1. These two sections should at least
acknowledge each other.

4.1.5 - s/prevent malicious master/prevent rogue master/

4.2 - s/ensures the authenticity and completeness/ensures the integrity and
completeness/

4.2.1.1 - s/Hop by Hop Integrity Protection/Hop-by-Hop Integrity Protection

4.2.1.1 - s/allows malicious TCs/allows rogue TCs/

4.2.1.1 - a/End to End Integrity Protection/End-to-End Integrity Protection/

4.3 - I guess depends on the scope of these recommendations but I don't
think is it feasible to require DoS protection. Also, you don't protect a
protocol from DoS you protect a device or a service. We SHOULD be
protecting the device and its network stack from DoS. Or the device and its
network interface MUST recover once a DoS has resolved.

4.4 - "MUST be resistant" is not a well-defined requirement

4.4 - This section is missing a Discussion sub-section

4.5.3 - This section is missing a Discussion sub-section

4.6 - "SHOULD be relatively lightweight" is not a well-defined requirement.
Suggestion: "SHOULD minimize computational load".

4.6 - "SHOULD not require excessive storage" is not a well-defined
requirement. Suggestion: "SHOULD minimize storage requirements".

4.6 - Move "as client restrictions often dictate a low processing and
memory footprint, and    because the server may have extensive fan-out."
from requirements to discussion sub-section

4.7 - s/against packet delay attacks/against packet delay, manipulation and
interception and removal attacks/

4.9 - s/a gradual process/incremental deployment/

6.1 - No packets are required to be modified on reception. The requirement
is to record and associate an arrival timestamp with received packets.
Remove discussion of reception modifications. Suggested modified text:

   Time synchronization protocols often require protocol packets to be
   modified during transmission. Both NTP and PTP in one-
   step mode require clocks to modify protocol packets with the time of
   transmission.

   In the presence of a security mechanism, whether encryption or
   integrity protection:

   o During transmission the security protocol must be applied after
      integrating the timestamp into the packet.

   To allow high accuracy, timestamping is typically performed as close
   to the transmission time as possible. However, since the
   security engine must be placed between the timestamping function and
   the physical interface, it may introduce non-
   deterministic latency that causes accuracy degradation. These
   performance aspects have been analyzed in the literature, e.g., in
   [1588IPsec] and [Tunnel].

6.2 - Two-step pertains only to transmission times. Suggested modified text:

   PTP supports a two-step mode of operation, where the time of
   transmission of protocol packets are
   communicated without modifying the packets. As opposed to one-step mode,
   two step timestamping can be performed without the requirement to
encrypt after timestamping.

6.5 - Discuss bootstrapping issue. You need a certificate to receive time.
You need time to validate a certificate.


Kevin Gross
+1-303-447-0517
Media Network Consultant
AVA Networks - www.AVAnw.com, www.X192.org