[TICTOC] Comments to draf

"Dr. Dieter Sibold" <dieter.sibold@ptb.de> Wed, 28 March 2012 14:05 UTC

Return-Path: <dieter.sibold@ptb.de>
X-Original-To: tictoc@ietfa.amsl.com
Delivered-To: tictoc@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7D77421E820D for <tictoc@ietfa.amsl.com>; Wed, 28 Mar 2012 07:05:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.264
X-Spam-Level:
X-Spam-Status: No, score=0.264 tagged_above=-999 required=5 tests=[AWL=0.203, BAYES_00=-2.599, HELO_EQ_DE=0.35, SARE_URGBIZ=0.725, URG_BIZ=1.585]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LiYmQMngPcka for <tictoc@ietfa.amsl.com>; Wed, 28 Mar 2012 07:05:21 -0700 (PDT)
Received: from mx1.bs.ptb.de (mx1.bs.ptb.de [192.53.103.106]) by ietfa.amsl.com (Postfix) with ESMTP id 4883721E808E for <TICTOC@ietf.org>; Wed, 28 Mar 2012 07:05:20 -0700 (PDT)
Received: from mx1.bs.ptb.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 91827B055AD for <TICTOC@ietf.org>; Wed, 28 Mar 2012 16:05:18 +0200 (CEST)
Received: from lotus.bs.ptb.de (lotus.bs.ptb.de [141.25.85.200]) by mx1.bs.ptb.de (Postfix) with ESMTP id 7C1BCAD83CC for <TICTOC@ietf.org>; Wed, 28 Mar 2012 16:05:18 +0200 (CEST)
Received: from n00512.bs.ptb.de ([192.168.5.12]) by s85202.bs.ptb.de (Lotus Domino Release 8.5.3) with ESMTP id 2012032816051486-20307 ; Wed, 28 Mar 2012 16:05:14 +0200
From: "Dr. Dieter Sibold" <dieter.sibold@ptb.de>
Date: Wed, 28 Mar 2012 16:03:47 +0200
Message-Id: <212FDDC3-8D7C-46A0-A055-BDE1A88626F4@ptb.de>
To: TICTOC@ietf.org
Mime-Version: 1.0 (Apple Message framework v1257)
X-Mailer: Apple Mail (2.1257)
X-MIMETrack: Itemize by SMTP Server on PALME/PTB(Release 8.5.3|September 15, 2011) at 03/28/2012 16:05:15, Serialize by Notes Server on LOTUS/PTB(Release 8.5.3 HF21|October 13, 2011) at 28.03.2012 16:05:15, Serialize complete at 28.03.2012 16:05:15, Serialize by Router on LOTUS/PTB(Release 8.5.3 HF21|October 13, 2011) at 28.03.2012 16:05:16, Serialize complete at 28.03.2012 16:05:16
Content-Type: multipart/signed; boundary="Apple-Mail=_26DB3459-FDCF-4B76-825D-4310FFC1EE14"; protocol="application/pkcs7-signature"; micalg="sha1"
Subject: [TICTOC] Comments to draf
X-BeenThere: tictoc@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Timing over IP Connection and Transfer of Clock BOF <tictoc.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tictoc>, <mailto:tictoc-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tictoc>
List-Post: <mailto:tictoc@ietf.org>
List-Help: <mailto:tictoc-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tictoc>, <mailto:tictoc-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2012 14:05:23 -0000

All,

Karen has urgently requested comments to draft-mizrahi-tictoc-security-requirements.  So here are my comments. They are based on version 01 from March 12, 2012.

This draft is meant to be for PTP and NTP. Yet please note that I'm not very familar with PTP. So my comments are formulated with NTP in mind.

(i) Section 1., question (3).
I don't understand this question. Please expressed it more clearly?

(ii) Section 4.1.2 (Proventication of Masters)
This requirement might be natural in PTP. However in NTP - as far as I understand it - the root of the time sychronization tree and the authentication tree can be different. To illustrate this: consider the case in which a stratum 2 server is connected to  two stratum 1 servers: let the first be the end of the authority tree, the  so-called trusted authority (TA) and let us assume the second one does not provide authentication at all. 
If we further assume that the first stratum 1 server has the better clock then eventually the stratum 2 server will choose the first stratum 1 server as system peer because NTP's selection algorithm does not consider authentication. Now we end up in a situation that for a NTP client that is connected to the stratum 2 server the time synchronization tree ends at the second stratum 1 server whereas his authorization tree ends at the first stratum 1 server. 
This requirement therefore would conflict with the current specification of autokey. So, an alternative formulation could be: Proventication of the authentication root. So the authentication root and time sync root can but have not to be on the same clock. Furthermore, I think this requirement is somewhat redundant to 4.9.1/2.

(iii) Section 4.3
In your discussion to this  requirement you claim, that authentication of clocks is sufficient to achieve this goal. This presumes that all authenticated clocks behave well which you can only assure if you have control over these clocks. But this is not always the case. E.g., if an organization like an National Metrology institute would provide an authenticated NTP service to the public it won't have control over these client. 

(iv) Section 4.6
I agree with the performance requirements in the case if we consider security requirements for a security protocol for PTP or NTP. But coming back to section 1., question (2) this draft also considers external security practices for which the requirements in 4.6 are probably to strong. So, the title of section 4 should make clear, that it considers time specific security protocols only.

(v) Section 4.9.1
That is an adequate requirement. I'm just asking myself if this could  also be accomplished by authentication, which is already required in 4.1.

(vi) Section 4.9.2
4.9.1 together with 4.9.2 ensures requirement 4.1.2 (proventication) if I see it right. But keep in mind, that 4.9.2 conflicts with autokey.

(vii) Section 6
Section 6 is in parts a duplication of the introduction. I'd like to emphazise on the second bullet (the question regarding the external security mechanism). I believe, that tunnel solutions, like IPSec or OpenVPN are used a lot, because in many use cases people need an authorized time source for legal reasons or for the purpose of traceability but without high demands on accuracy. Just as Karen mentioned yesterday in the case of smart grids which is also the case in Germany.  Therefore, it might be reasonable to add a list of available external security practices together with their influence on time synchronization  to this draft. So people would be able to decide if they timing requirements they have are still met if an external security mechanism is applied.

Hope this is useful
Regards
Dieter