Minutes interim-2018-ntp-03: Tue 16:30
minutes-interim-2018-ntp-03-201812181630-01
| Meeting Minutes | Network Time Protocols (ntp) WG Snapshot | |
|---|---|---|
| Title | Minutes interim-2018-ntp-03: Tue 16:30 | |
| State | Active | |
| Other versions | plain text | |
| Last updated | 2019-01-23 |
minutes-interim-2018-ntp-03-201812181630-01
# NTP Virtual Interim Meeting
Time: Dec 18, 2018 4:30 PM UTC
Participants:
Dieter, Karen, Daniel, Marcus, Martin, Tal, Miroslav, Denis, Kristof, Danny,
Watson Ladd, Rich Salz, Aanchal, Harlan
Minutes: Dieter
1. Administrative and Agenda Bashing
-------------------------------------
- Put item "Time Security beyond NTS" at the end of the agenda
Note Well by Karen
Nobody opposed to record the meeting
2. TICTOC quick document status (documents we hopefully won’t need to discuss)
-------------------------------------------------------------------------------
Two outstanding documents:
(i) Yang model for 1588 is in the second IETF LC (status )
(ii) 1588 Enterprise profile WGLC is complete and ready to go to the
IESG.
There is still the pOpen issue with the availability of the
underlying IEEE document.
If both docs are finished the WG shall be closed.
3. NTP quick document status
-----------------------------
- MAC code for NTP is finish, the write-up must be finished
- BCP is in balloting with the IESG (probably one final round for small
editorial changes).
Karen thank the authors of these two documents for their work, especially
Aanchal and Denis.
4. Network Time Security for the Network Time Protocol (WGLC wrap-up)
----------------------------------------------------------------------
- WGLC finished for the document.
- Majority of the reviewers are in favor that this document should go
forward - Some comments have been made and have been considered in the
new version 15
released on Monday.
- Summary of the changes
* The Security Consideration's section now recommend that a
client should not
automatically perform an key exchange when the server
certificate expires. If the client has received valid time
responses and therefore cookies that lay within the validity
time of the certificate it should continue using the cookies.
More information by Marcus.
* A sentence has been added that higlights the importance of
ciphersuits that
provides forward secrecy.
* The language witch describes the behavior of the client if
the NTS-KE exchange
fails has been enhanced (comment by Miroslav)
* Occurences of ‘bytes’ have been replaced by ‘octets’
* In the section Security Considerations: Marcus inserted a
subsection on a
NTS stripping attack.
* Several tyos have been fixed and some editorial changes have
been done.
- Not considerd comments
* TLS 1.3: the authors agree that it is not advisable to
enforce TLS 1.3 at
this time. The current language allows an implementation to
provide 1.2 or 1.3 or both.
* Heiko Gerstung proposed to request an port assignment for NTS
protected
time synchronization messages. This still is an open point.
- Daniel: does't agree with the Marcus's change that an client shall not
automatically perform an key exchange if the servers certificate
expires. The right solution is to do the KE handshake at a random
point prior to the expiration.
- Watson: why should an expiration enforce a new handshake?
- Daniel: Discussion started about the chicken-and-egg problem when the
client starts
the association and has no idea about the current time and cannot
verify the certificate's validity window. One recommendation was not
to accepted an initial time outside the certificate's validity
window. Maybe it is sufficient that once the client got a time from
the server that is inside the validity window and what is later
received is consistent with what is received originally just go ahead
accepting it after the certificate expiration.
- Marcus: If the client is doing the KE the certificate guarantees that
the client
exchange keys with whoever ist in control of that domain with the
certificate at that point. If the certificate expires the client can
still safely assume that the person who was in control of the domain
at the initial KE is still the person who the client is doing time
sync with.
- Watson: that is the best you could do.
- Karen: Daniel, do you suggest a clarification to the text?
- Daniel: text is reasonable but want to have requirement's language
- Marcus applied requirement language
- Dieter changed that because this text is within the Security
Consideration section - Karen: Security Consideration section generally
do not have 2119 language - Daniel: have seen a lot of exception to
that - Rich: if the protocol should something enforce it is usually in
the text and not
in the Security Considerations.
- Kristof: ask which scenario causes a KE exchange.
- Daniel: Reason for a new KE is either receiving a NTS NAK or running
out of
cookies
- Kristof: there is a scenario you never do a KE
- Daniel: Because of this text people could do implementation mistake
and never do a
new KE after the certificate expiration if the client does not
receive a NTS NAK or never running out of cookies.
- Kristof: seems to be worrisome
- Rich: Suggest to add a sentence in the Security Considerations that
says,
this might happen e.g. if the server's certificate expires but old
cookie still exist.
- Daniel: Right, we should also explicitly state the motivation not
doing
immediate handshake which is preventing from accidental DoS attacks.
- Karen: This should be solved by Marcus, Rich, Daniel, Watson, and
Kristof
- Karen: What about Heiko's request about the TCP and UDP assignment
request?
- Dieter: Meinberg plans to implement NTS as a daemon separated from
NTPD. Since
ntpd requires UDP/123 the NTS daemon shall be addressed via an
alternative port. Meinberg would like to have an UDP port assignment
for NTS protected NTP messages.
- Watson, Daniel, Karen, Harlan, Danny: some clarification about
Meinberg's intention
followed by a discussion. Concerns about NTP rulesets in firewalls,
etc.
- All: General consensus that the NTS document shall require a port
assignment for
the key exchange but not for the exchange of time messages.
- Rich points out, that this can be done afterwards also.
- Karen summaries:
- There is consensus in the WG to go forward with this document
- Harlan has following issues
* EF type form
* Scoping of the draft to be client-server mode only
- we are open to expand the scope in the future
- one more editing necessary before submitting to IESG
- Daniel: the remaining issues can be summarized in the shepherd writeup
- Karen: will send the shepherd writeup to the mailing list so that the
group can
help that it describes the remaining issues properly
- Sam Weiler propose that we follow Harlan's suggested values for the
EF codes
for the NTS EF unless this is demonstrated to be harmful
- Daniel opposes putting any text in the document requesting those code.
If we submit the document as it is we can talk to IANA out of band
and ask them to assign these specific code once.
- Karen is happy to do an early allocation request to IANA for those
specific codes.
This does not imply generic structure until the EF staff is updated
- Sam agrees that this in a one-time early allocation request. His
intention is to
leave open the possibility that Harlan EF draft will get consensus.
- Karen would like to work with Sam to send a very concise mail to the
WG that
that says we plan to add this to the EF document so that the WG can
determine that this is not harmful.
5. Planning for NTS interoperability testing
---------------------------------------------
- Karen: various implementations are in progress
- Karen: will send to the WG the address of a mailing list for discussions on
and interoperability testing of NTS implementations
- Karen: A NTS hackathon event is planned or IETF 104 (Prag). Strongly
encourage the
use of the mailing list to plan for the hackathon event
- Watson: We might be able to get a public server for interoperability purposes
up
6. Network Time Protocol REFID Updates (WGLC wrap-up)
------------------------------------------------------
- Karen: we did a WGLC on this document. Not many responses and some objections
- Karen will work together with Harlan offline to expand on the objections from
Miroslav and Steven.
- WE have to issue another WGLC to get more consensus
- Action: Take this document out of WGLC status and back to working group
document
status.
7. NTP Interleaved Modes (WGLC wrap-up)
----------------------------------------
Karen: we had a WGLC on this document
Miroslav: status of WGLC
- quite some comments
- new version of the draft has been uploaded to address these comments. There
have been
no changes of the protocol itself. The updated draft improves on the goals of
this draft. Why we need interleave mode? How it improves accuracy? Why we
don't use follow-up messages? The Security Considerations section is also
updated in regard to DoS attacks.
- Harlan is particularly concerned about clients which receives interleave
responses
although they don't expect that. Harlan will investigate this.
- Miroslav: that should not happen
- Harlan: if this does not happen Harlan has no objections
- Harlan still want to discuss with Miroslav to have the option for a follow-up
messages
in order to avoid that the server has to keep state
- Karen: Harlan and Mirsolav should work out there issues until mid January
- Karen: this document has passed WGLC pending resolution of this one issue
8. NTP Client Data Minimization (WGLC wrap-up)
-----------------------------------------------
- Karen:
- this document is in WGLC
- no update since Sep. 2018
- Aanchal:
- most of the issues are addressed
- Harlan has some issues, for which he want to send in more detail
- Harlan: I have more stuff to say about this.
- Daniel: Harlan claims that data minimization can be harmful in some
circumstances
but without specifying the circumstances. That needs some elaboration.
- Harlan: Miroslav already pointed out that zero timestamp is problematic, poll
interval
is important around a leap second event.
- Harlan: mentioned upcoming code which will not work with data minimization
- Karen: pointed out that we cannot lock this draft because of upcoming code
that is
neither described nor published
- Karen: ask Aanchal to review all comments regarding this draft and to send a
mail to
the mailing list which specifically complies the open issues and
solicit input for those issues
- Watson: I see that data minimization is mentioned in the Security
Considerations
section of NTS but I don't see that it is required to be implemented
by clients.
- Daniel: It isn't required. But it is still a reference we are not willing to
remove.
NTS cannot be published until data minimization is published.
- Danny: A dumb client will ignore any auxiliary information from the server.
For such
clients it doesn't matter what you put into this document.
- Miroslav: If a client supports the adjustment of the poll interval around a
leap second
by following the suggestion of the server it can ignore this
specific part of the data minimization. No conflict here.
- Karen: changes here request to Aanchal: Question to Harlan: when will you
send your
comments to the mailing list?
- Harlan: It depends. I will do my best. Will turn this into something more
collaborative. - Harlan: suggest to add more guidance about in which situation
minimization can be
applied or cannot be applied.
- Daniel: is ready to consider the language of the draft. So far he isn't
persuaded
of any case where you don't want to minimize.
- Daniel, Watson, Harlan, Danny: some discussion about the necessity whether or
not
the client has to send his polling interval in the context of KoD and
client-server interleave mode
- Daniel: ask Harlan to publish a document about the new polling interval
mangement. This
document can explicitly describes situations in which the polling
interval management and data minimization conflicts.
- Karen ask Harlan again to send actionable suggestions to the mailing list
regarding
this document.
- Karen ask Aanchal to summarize the results thus far
- Karen points out that we might add some generic language to the draft. But
the IETF
has a long history in publishing RFCs that updates older RFC. She recommends
to publish this draft for the situation that exists now and not for a
situation that might come up in the future.
- We have to postpone the final decision on forwarding this docuement to the
IESF until
Harlan's and Aanchal's action have been completed.
9. Leap second file
--------------------
- Karen: If we need to have the leap second file maintained on www.ietf.org we
need to
have a document that specifies the rules for maintaining it. Currently the
IETF has a trouble ticket issued on this file with no clear indication what
the IETF process is to manage this file.
- Danny: ask who is responsible for the leap second.
- Karen: Responsible is the IERS (International Earth Rotation and Reference
Systems
Service)
- Denise
- IERS is responsible for the announcement of leap second
- The national metrology institutes are responsible for dissemination of this
information (somehow)
- The BCP contains three different links to this file
- the file is on the IETF website because this file is also included in the
timezone
database maintained by IANA (BCP 175)
- Karen: One of the NTP implementors was saying that their code points to the
the file
at the IETF website. Therefore they want to have it maintained. Either it is
not needed by anybody than the IETF website team does not have to worry about
it or it is needed than we have to indicate this and have to inform who
maintains it.
- Denis: Recommend to maintain the link to the TZ database. There is already a
RFC about
how it is maintained.
- Harlan: the ntpd distribution is using the link to the IETF website. But it
could also
be adjusted.
- Daniel: nothing in RFC 5905 presumes the existence of this file in any
particular place
or format
- Denis: RFC 6557 (BCP 175) describes the maintenance of the TZ database.
- Karen: We will see that we describe what we want to do with the file.
Consensus is
that it needs to be documented, possibly moved to IANA.
10. Guidelines for Defining Packet Timestamps (WGLC wrap-up)
-------------------------------------------------------------
- Karen: WGLC finished
- Karen (2 objections, not many reviews and comments)
- Tal: two main comments which have been addressed after some iterations. The
comment
from Denis is also considered.
- Tal: draft is pretty stable
- Karen ask if there is any opposition to move this draft to the IESG
- Watson want to have a look at it and send a review to the mailing list
- Tal also ask people to send there opinion on this draft
- Karen will send a note to the mailing list and request comments and opinion
on this
draft in oder to be able to forward it to the IESG
12. AOB (Any Other Business?)
Time Security beyond NTS
------------------------
- Watson: want to promote something like Roughtime.
The idea is to sacrifice time synchronization
accuracy in order to be able to track servers and that they don't provide
clients with false time. Realized by providing signatures of timestamps. Want
to see this more widely deployed.
- Daniel: is the idea to recommend Roughtime in particular?
- Watson: has some problems with Roughtime especially the smearing of the leap
second. - Watson: is interested in working together with someone on something
like Roughtime. - Daniel: is interested in an outline of such a document -
Aanchal has a couple of concerns about Roughtime which she is willing to share
- Karen to Watson: please send some pointers to the mailing list about Roughtime
- Next Interim week of 21st January