IEEE 1588 (PTP) specifies how updates are delivered. Unlike NTP, PTP
does not specify what devices do with these updates. In both cases,
stability in the absence of updates is mostly a function of the
quality of the local oscillator and not so much dependent on the time
protocol.

Kevin Gross

On Thu, Oct 20, 2011 at 6:22 AM, Danny Mayer <ma...@ntp.org> wrote:
> On 10/18/2011 3:33 PM, Nico Williams wrote:
>> On Tue, Oct 18, 2011 at 12:45 PM, Kevin Gross <kevin.gr...@avanw.com> wrote:
>>> Nico's contention is that it should take a constant amount of time to
>>> decrypt a packet once it is received. I don't think this is exactly true but
>>> when compared to other (variable) latencies in the system, possibly a
>>> reasonable approximation.
>>
>> Not constant so much as deterministic (for some algorithms, and some
>> implementations, but I assume that side-channels are not desirable,
>> which leads to the assumption of deterministic timing) or measurable.
>> In practice measuring this time is probably difficult, for example, in
>> preemptible kernel designs, or if the HW lacks a sufficiently high
>> resolution timer or CPU cycle counter.  I grant then that the proposed
>> solution is simpler to implement.  But should the proposal be
>> negotiable, and if so, how?
>>
>>> If an attacker delays or drops synchronization packets, clock quality will
>>> suffer. In the extreme case, all useful clock communication is lost and
>>> nothing works. I don't think this situation is any different for clock
>>> traffic than it is for other traffic. Encryption cannot prevent denial of
>>> service.
>>
>> However, encryption can make it harder for an attacker to delay just
>> the timing packets (though not impossible given enough meta-data
>> leaking to mount effective traffic analysis).  Or, to put it
>> differently, making timing packets identifiable makes it easier for an
>> attacker to DoS only the timing exchanges but not the rest.
>>
>> DoS attacks based on not allowing packets through, or delaying them,
>> generally cannot be avoided, so perhaps there's no cause for concern.
>> I think you'd want to have a security consideration describing the
>> problems that might arise from a selective DoS attack on timing, as
>> well as mitigations.
>
> For NTP at least, the loss of some packets doesn't matter, it will
> continue on disciplining the clock at the same rate until it decides it
> has enough reliable data to adjust the frequency of the clock to bring
> it back in line with its NTP reference clock servers. Even then it will
> throw out packets which show large variations. In the worst case it will
> be receiving no valid packets and just won't make changes to the clock.
> NTP is robust enough that the clock will be accurate enough even if it
> hasn't received a single packet for hours. I cannot answer for PSP since
> I don't know what it does.
>
> Danny
>
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to