Re: [ntp:questions] Secure NTP

2011-03-28 Thread jimp
Chris Albertson  wrote:
> On Mon, Mar 28, 2011 at 8:56 AM,   wrote:
> 
>>
>> OK, so the bad guy sets up the stuff for a GPS spoofer and parks it next
>> to the targeted building where high dollar value stuff goes on in hopes
>> of tweeking their system clocks and stealing a fortune.
> 
> The best application of GPS signal spoofing would be at sea.  You
> could ship your jammer/spoofer as cargo and have it steer the ship off
> course.  After a day or two of being subtly off course the error could
> add up to hundreds of miles.  then you meet it at some point and even
> if the ship transmits an SOS the location will be far from the real
> location and the authorities will respond to some place you are not.
> However a competent ships captain would periodically check GPS using
> some other method, maybe even celestial navigation.

For this to work, your spoofer has to spoof 4 satellites as well as know
its actual position independant of GPS so the ship is steered to somewhere
that you can find it.

Most civilian ships these days have neither the people or equipment to do
celestial navigation.

And all of this is pointless as once the ship is any significant distance
at sea as all you have to do is attack the ship from a faster boat that
is well armed.

Google Somali pirates.

> For truck hijacking a simple jammer is used to disable any GPS
> tracking.  A spoofed gps could never fool a driver into thinking he is
> 100 miles away and driving off road.  Even a totally confused and lost
> truck driver knows he is on a road.

So GPS tracking is AFU.

All that means is the trucking compay is unable to say for sure the
driver didn't spend a couple of hours at the boobie bar.

It doesn't do much for you unless you intend to steal the entire truck
and keep it for long that the cops become involved.


-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-28 Thread Chris Albertson
On Mon, Mar 28, 2011 at 8:56 AM,   wrote:

>
> OK, so the bad guy sets up the stuff for a GPS spoofer and parks it next
> to the targeted building where high dollar value stuff goes on in hopes
> of tweeking their system clocks and stealing a fortune.

The best application of GPS signal spoofing would be at sea.  You
could ship your jammer/spoofer as cargo and have it steer the ship off
course.  After a day or two of being subtly off course the error could
add up to hundreds of miles.  then you meet it at some point and even
if the ship transmits an SOS the location will be far from the real
location and the authorities will respond to some place you are not.
However a competent ships captain would periodically check GPS using
some other method, maybe even celestial navigation.

For truck hijacking a simple jammer is used to disable any GPS
tracking.  A spoofed gps could never fool a driver into thinking he is
100 miles away and driving off road.  Even a totally confused and lost
truck driver knows he is on a road.

The obvious case where you'd like to spoof GPS is if you are being
targeted by GPS guided smart bombs or cruise missiles.   The trouble
is that the designers of said weapons have already figured that you
might be using a jammer and have planned for that.

-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-28 Thread jimp
Uwe Klein  wrote:
> j...@specsol.spam.sux.com wrote:
>> At that point they start slowly changing the time to something else.
>> 
>> Meanwhile, inside the building where NTP was set up by someone with a clue
> if you go by the questions placed here on occasion that assumption is not a 
> given ;-)
> 
>> that bothered to read the documentation, the target client computers notice
>> that the GPS source is different than all the other sources and decide the
>> GPS source has failed and ignore the GPS data.
>> 
>> Drat that NTP voting alogorithm.
> 
> engineering is a management of negatives ( positives is for weenies )
> 
> If I had that clocker job (not likely)
> I would disable all but one source and spoof the remaining in advance.
> my guess is that even most high profile setups won't complain
> about being reduced to a single source for time.

You are talking about an inside job and neither NPT authentication nor
any other software based tool is able to do much about that.

If you are already inside, there are easier and more direct ways to steal
than messing with system clocks.

I deal with an organization where the correct time is modestly (in terms
of what NTP can do) important.

It is important to them that all systems are within about 0.25 seconds of
the real time.

The local division I support has three systems set up as NTP servers and a
stand alone GPS NTP box to provide time for all the division client
systems.

The three NTP servers get their time from the local GPS NTP box as well
as other GPS NTP boxes and CDMA NTP boxes located at other corporate sites
hundreds of miles away on the private corporate network and additionally
from several public NTP servers on the Internet.

Spoof that.



-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-28 Thread Uwe Klein

j...@specsol.spam.sux.com wrote:

At that point they start slowly changing the time to something else.

Meanwhile, inside the building where NTP was set up by someone with a clue

if you go by the questions placed here on occasion that assumption is not a 
given ;-)


that bothered to read the documentation, the target client computers notice
that the GPS source is different than all the other sources and decide the
GPS source has failed and ignore the GPS data.

Drat that NTP voting alogorithm.


engineering is a management of negatives ( positives is for weenies )

If I had that clocker job (not likely)
I would disable all but one source and spoof the remaining in advance.
my guess is that even most high profile setups won't complain
about being reduced to a single source for time.

Manipulating trading systems probably is high risk, high gain so "some" 
expenditure
would be acceptable.

The thing that saves us here is the same that saves us from hideously effective
terrorist bombs. Criminal and ideological baddies tend to lack real engineering 
talent.

But I wouldn't bet on that in all cases.

uwe

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-28 Thread jimp
Uwe Klein  wrote:
> j...@specsol.spam.sux.com wrote:
>> Richard B. Gilbert  wrote:
> 
>>>Didn't I just see an announcement that GPS was going to be jammed in 
>>>order to test something or other?
>> 
>> 
>> Yeah, it happens quite often on a scheduled basis in limited areas.
>> 
> Hmm, it should not be all that difficult to set up a limited reach
> GPS WAAS/EGNOS impostor.
>> 
> elsewher:
> Bruce Schneier ( security guy ):
> http://www.schneier.com/blog/archives/2008/09/gps_spoofing.html
> 
> 
> uwe

OK, so the bad guy sets up the stuff for a GPS spoofer and parks it next
to the targeted building where high dollar value stuff goes on in hopes
of tweeking their system clocks and stealing a fortune.

First issue; a big bucks operation is likely in a multi-story building
with the GPS antenna on the roof and GPS antennas have low sensitivity
looking down.

Our bad guys just happen to know something about antenna patterns, so they
obtained some high power RF amplifiers to make sure their signal dominates.

So, after carefully syncing their spoofer to the real time, because if they
don't, the time jump will just be rejected, the bad guys start cranking up
the output power until their signal dominates.

At that point they start slowly changing the time to something else.

Meanwhile, inside the building where NTP was set up by someone with a clue
that bothered to read the documentation, the target client computers notice
that the GPS source is different than all the other sources and decide the
GPS source has failed and ignore the GPS data.

Drat that NTP voting alogorithm.



-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-28 Thread Uwe Klein

j...@specsol.spam.sux.com wrote:

Richard B. Gilbert  wrote:


Didn't I just see an announcement that GPS was going to be jammed in 
order to test something or other?



Yeah, it happens quite often on a scheduled basis in limited areas.


Hmm, it should not be all that difficult to set up a limited reach
GPS WAAS/EGNOS impostor.



elsewher:
Bruce Schneier ( security guy ):
http://www.schneier.com/blog/archives/2008/09/gps_spoofing.html


uwe

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
Richard B. Gilbert  wrote:
> On 3/27/2011 5:45 PM, j...@specsol.spam.sux.com wrote:
>> E-Mail Sent to this address will be added to the 
>> BlackLists  wrote:
>>> Richard B. Gilbert wrote:
 j...@specsol.spam.sux.com wrote:
> Let's see you spoof the Internet, GPS, and CDMA all at the same time.

 Any two would be sufficient!
>>>
>>> GPS Jamming could take out the GPS and CDMA.
>>
>> Granted, but that is not "spoofing" nor would it cause the time of anything
>> to become incorrect by some amount.
>>
>> Also, jamming both GPS and CDMA would likely greatly arouse the ire of the
>> powers that be.
>>
>>
>>
> 
> Didn't I just see an announcement that GPS was going to be jammed in 
> order to test something or other?

Yeah, it happens quite often on a scheduled basis in limited areas.


-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread Chris Albertson
On Sun, Mar 27, 2011 at 5:22 PM, Richard B. Gilbert
 wrote:
>>
>> Also, jamming both GPS and CDMA would likely greatly arouse the ire of the
>> powers that be.

I agree that jamming is not spoofing although the most sophisticated
form of jamming to to spoof a signal.  So the receiver gets a false
signal and dose not know it i being jamed.  But the units being sold
out of China are just simple, low power noise makers  The available
cell phone jammers are very low power and only work within say one
room.   Same for GPS jammers.  They are very low power devices.
-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread Richard B. Gilbert

On 3/27/2011 5:45 PM, j...@specsol.spam.sux.com wrote:

E-Mail Sent to this address will be added to the 
BlackLists  wrote:

Richard B. Gilbert wrote:

j...@specsol.spam.sux.com wrote:

Let's see you spoof the Internet, GPS, and CDMA all at the same time.


Any two would be sufficient!


GPS Jamming could take out the GPS and CDMA.


Granted, but that is not "spoofing" nor would it cause the time of anything
to become incorrect by some amount.

Also, jamming both GPS and CDMA would likely greatly arouse the ire of the
powers that be.





Didn't I just see an announcement that GPS was going to be jammed in 
order to test something or other?


___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
Chris Albertson  wrote:
> On Fri, Mar 25, 2011 at 8:40 AM,   wrote:
> 
>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
> 
> Summary of above argument:
> "You can't spoof my system, therefor other systems can't be spoofed."

Nope.

Try reading it again, this time for comprehension.



-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
Maarten Wiltink  wrote:
>  wrote in message
> news:5lpu58-278@mail.specsol.com...
>> Uwe Klein  wrote:
> [...]
>>> The $something trading solutions that require exact timematch
>>> ( remember the recent rush of ntp users
>>>   requiring u-second global time match )
>>> over a set of widely distributed hosts allow fraud in
>>> various ways if you can manipulate the time for some select host.
>>
>> One more time, if time is critical to your operation you do NOT have
>> one and only one NTP server.
>>
>> You have serveral servers with local GPS and CDMA NTP boxes.
>>
>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
> 
> I'll solve (the subproblems of) the big problems just like the little
> problems. One at a time.
> 
> That there are other lines of defence is no reason to neglect any one
> of them. Every single one is there in case the other ones fail. Any and
> all of the other ones.
> 
> You do not improve security by stacking the lemon meringue walls higher,
> or thicker.
> 
> Groetjes,
> Maarten Wiltink
 
You do not improve secuity by worrying about, and spending time on, imaginary
threats.
 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
unruh  wrote:
> On 2011-03-25, j...@specsol.spam.sux.com  wrote:
>> Miroslav Lichvar  wrote:
>>> On Thu, Mar 24, 2011 at 05:01:07PM -0700, Chris Albertson wrote:
 Security is so that you know you are not being spoofed.  Or if you are
 providing the time so that you can prove to your users that you are
 who you claim to be and are not spoofing them.
 
 There is the chance that someone might "impersonate" one of your
 servers or a server you use. and then make a computer's clock be set
 to the wrong time.   Again "who cares" if you only use your computer
 to serf the web and read emails but what if you were a bank processing
 ATM or visa card transactions or worse a computer routing trans or
 airplanes or controlling stop lights.
>>> 
>>> There is one important thing I haven't seen mentioned here. A MITM
>>> doesn't need to modify the NTP packets to seriously degrade your
>>> timekeeping. He can exploit the PLL instability when undersampled and
>>> by dropping and delaying the packets (up to maxdist, 1.5s by default)
>>> he can fairly quickly throw your clock off and let you drift away.
>>> 
>>> In addition to the authentication, it's important to monitor
>>> reachability of the peers.
>>
>> One more time, if time is critical to your operation you have several
>> sources to include local GPS and CDMA NTP boxes.
> 
> I do not understand. If you do not want to use the authentication, don't.
> Noone is forcing you to. We really do not care if you have thought
> through your security or not. But at this point it sounds like you are
> on a crusade against having the authentication in ntpd, and that
> is bizarre. If you think it adds nothing, do not use it. Or if it
> offends you to have something in a program you do not use, then rewrite
> ntpd to remove the sections that are offensive to you and use that. 
> And learn once again that you may not completely understand everyone
> else in the world. 

You must really have your panties in a bunch if asking what good is NTP
authentication becomes a "crusade" in your mind.

As far as I can see, given the way NTP works and the number of available
and independant sources, authentication may make you feel good about it,
but has no added value.
 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
Uwe Klein  wrote:
> j...@specsol.spam.sux.com wrote:
>> One more time, if time is critical to your operation you do NOT have one
>> and only one NTP server.
> 
> One more time, the times of well designed protocolls
> and infrastructure software are gone ;-)
> Today the PHB and his idiot savant minions rule.
>> 
>> You have serveral servers with local GPS and CDMA NTP boxes.
>> 
>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
>> 
>> 
> Pfft. you don't have to.
> 
> The GFC is not only witness to the haphazard portfolio of  products traded
> but also the (lack of) basic understanding brought to financial 
> infrastructure.
> 
> IMHO, It is not well designed with an eye on faulttolerance, congestion, ...
> 
> uwe

Non sequitur.

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
David Woolley  wrote:
> j...@specsol.spam.sux.com wrote:
> 
>> One more time, if time is critical to your operation you have several
>> sources to include local GPS and CDMA NTP boxes.
> 
> You missed an important point, your CEO must also have a current science 
> background.  Most UK CEOs, at least, have an arts background, and are 
> quite likely to lead to solutions with no local time receivers, because 
> they require capital expenditure.

Yeah, that is a possible scenario; total stupidity in charge.

But you don't need a science background to understand that if accurate
time keeping has an economic impact on your organization, you had better
keep it accurate.

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
E-Mail Sent to this address will be added to the BlackLists 
 wrote:
> Richard B. Gilbert wrote:
>> j...@specsol.spam.sux.com wrote:
>>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
>>
>> Any two would be sufficient!
> 
> GPS Jamming could take out the GPS and CDMA.

Granted, but that is not "spoofing" nor would it cause the time of anything
to become incorrect by some amount.

Also, jamming both GPS and CDMA would likely greatly arouse the ire of the
powers that be.

 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-27 Thread jimp
Richard B. Gilbert  wrote:
> On 3/25/2011 11:40 AM, j...@specsol.spam.sux.com wrote:
>> Uwe Klein  wrote:
>>> j...@specsol.spam.sux.com wrote:
>>>
 If you specify the server by IP address, how does that happen and who
 would bother to do it?
>>>
>>> The $something trading solutions that require exact timematch
>>> ( remember the recent rush of ntp users
>>>requiring u-second global time match )
>>> over a set of widely distributed hosts allow fraud in
>>> various ways if you can manipulate the time for some select host.
>>
>> One more time, if time is critical to your operation you do NOT have one
>> and only one NTP server.
>>
>> You have serveral servers with local GPS and CDMA NTP boxes.
>>
>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
>>
>>
> 
> Any two would be sufficient!

Nope, Assuming you had three independant sources of NTP information, you
would have to spoof two of them identically, which is virtually impossible
for anything less than a government, or two of the three would just appear
to be "failed".


-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Hal Murray
In article ,
 Steve Kostecke  writes:
>On 2011-03-24, Hal Murray  wrote:

>> Yes.  The encryption also verifies that you are talking to the
>> server you think you are talking to rather than an imposter.
>
>NTP Authentication adds signatures to the packets. There is no
>encryption.

Thanks for the correction.

-- 
These are my opinions, not necessarily my employer's.  I hate spam.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread David Woolley

j...@specsol.spam.sux.com wrote:


One more time, if time is critical to your operation you have several
sources to include local GPS and CDMA NTP boxes.


You missed an important point, your CEO must also have a current science 
background.  Most UK CEOs, at least, have an arts background, and are 
quite likely to lead to solutions with no local time receivers, because 
they require capital expenditure.


___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread David Woolley

E-Mail Sent to this address will be added to the BlackLists wrote:

Richard B. Gilbert wrote:

j...@specsol.spam.sux.com wrote:

Let's see you spoof the Internet, GPS, and CDMA all at the same time.

Any two would be sufficient!


GPS Jamming could take out the GPS and CDMA.


And the coarse/acquisition code that I presume is used by normal 
commercial GPS clocks is public knowledge, so can be spoofed.




___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Richard B. Gilbert

On 3/25/2011 11:40 AM, j...@specsol.spam.sux.com wrote:

Uwe Klein  wrote:

j...@specsol.spam.sux.com wrote:


If you specify the server by IP address, how does that happen and who
would bother to do it?


The $something trading solutions that require exact timematch
( remember the recent rush of ntp users
   requiring u-second global time match )
over a set of widely distributed hosts allow fraud in
various ways if you can manipulate the time for some select host.


One more time, if time is critical to your operation you do NOT have one
and only one NTP server.

You have serveral servers with local GPS and CDMA NTP boxes.

Let's see you spoof the Internet, GPS, and CDMA all at the same time.




Any two would be sufficient!

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread E-Mail Sent to this address will be added to the BlackLists
Richard B. Gilbert wrote:
> j...@specsol.spam.sux.com wrote:
>> Let's see you spoof the Internet, GPS, and CDMA all at the same time.
>
> Any two would be sufficient!

GPS Jamming could take out the GPS and CDMA.

-- 
E-Mail Sent to this address 
  will be added to the BlackLists.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Steve Kostecke
On 2011-03-25, Chris Albertson  wrote:
>> NTP Authentication adds signatures to the packets. There is no
>> encryption.
>
> What are "signatures"?

Message Authenticator Code (MAC)

> How are they generated?

Search for 'hash' in:

http://www.ece.udel.edu/~mills/database/reports/stime1/stime.pdf

> Signatures are typically encrypted hashes of the message.

See section 4 (which starts on page 10).

"NTPv3 and NTPv4 symmetric key cryptography uses keyed-MD5 message
digests with a 128- bit private key and 32-bit key ID. In order to
retain backward compatibility with NTPv3, the NTPv4 key ID space is
partitioned in two subspaces at a pivot point of 65536. Symmetric key
IDs have values less than the pivot and indefinite lifetime. Autokey key
IDs have pseudo-random values equal to or greater than the pivot and
are expunged immediately after use. Both symmetric key and public key
cryptography authenticate as shown in Figure 1. The server looks up the
key associated with the key ID and calculates the message digest from
the NTP header and extension fields together with the key value. The key
ID and digest form the message authentication code (MAC) included with
the message. The client does the same computation using its local copy
of the key and compares the result with the digest in the MAC. If the
values agree, the message is assumed authentic."

-- 
Steve Kostecke 
NTP Public Services Project - http://support.ntp.org/

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Chris Albertson
On Fri, Mar 25, 2011 at 8:40 AM,   wrote:

> Let's see you spoof the Internet, GPS, and CDMA all at the same time.

Summary of above argument:
"You can't spoof my system, therefor other systems can't be spoofed."


So far all the arguments seem to be equivalent to either
(1)  "I don't need this therefor others should not need it." or,
(2) "I cannot see how X could happen, therefore X cannot happen."

The trouble with universal statements like "X can't happen" or "no one
would,..." is that they can be shown to be false with only one counter
example.   Of course some universal statements are in fact true.  One
way you can show a universal to be true is to assume it is false and
then show that some law of mathematics or physics would be violated.
But any number of examples or statistics will never work.


-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread unruh
On 2011-03-25, j...@specsol.spam.sux.com  wrote:
> Miroslav Lichvar  wrote:
>> On Thu, Mar 24, 2011 at 05:01:07PM -0700, Chris Albertson wrote:
>>> Security is so that you know you are not being spoofed.  Or if you are
>>> providing the time so that you can prove to your users that you are
>>> who you claim to be and are not spoofing them.
>>> 
>>> There is the chance that someone might "impersonate" one of your
>>> servers or a server you use. and then make a computer's clock be set
>>> to the wrong time.   Again "who cares" if you only use your computer
>>> to serf the web and read emails but what if you were a bank processing
>>> ATM or visa card transactions or worse a computer routing trans or
>>> airplanes or controlling stop lights.
>> 
>> There is one important thing I haven't seen mentioned here. A MITM
>> doesn't need to modify the NTP packets to seriously degrade your
>> timekeeping. He can exploit the PLL instability when undersampled and
>> by dropping and delaying the packets (up to maxdist, 1.5s by default)
>> he can fairly quickly throw your clock off and let you drift away.
>> 
>> In addition to the authentication, it's important to monitor
>> reachability of the peers.
>
> One more time, if time is critical to your operation you have several
> sources to include local GPS and CDMA NTP boxes.

I do not understand. If you do not want to use the authentication, don't.
Noone is forcing you to. We really do not care if you have thought
through your security or not. But at this point it sounds like you are
on a crusade against having the authentication in ntpd, and that
is bizarre. If you think it adds nothing, do not use it. Or if it
offends you to have something in a program you do not use, then rewrite
ntpd to remove the sections that are offensive to you and use that. 
And learn once again that you may not completely understand everyone
else in the world. 

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread jimp
Miroslav Lichvar  wrote:
> On Thu, Mar 24, 2011 at 05:01:07PM -0700, Chris Albertson wrote:
>> Security is so that you know you are not being spoofed.  Or if you are
>> providing the time so that you can prove to your users that you are
>> who you claim to be and are not spoofing them.
>> 
>> There is the chance that someone might "impersonate" one of your
>> servers or a server you use. and then make a computer's clock be set
>> to the wrong time.   Again "who cares" if you only use your computer
>> to serf the web and read emails but what if you were a bank processing
>> ATM or visa card transactions or worse a computer routing trans or
>> airplanes or controlling stop lights.
> 
> There is one important thing I haven't seen mentioned here. A MITM
> doesn't need to modify the NTP packets to seriously degrade your
> timekeeping. He can exploit the PLL instability when undersampled and
> by dropping and delaying the packets (up to maxdist, 1.5s by default)
> he can fairly quickly throw your clock off and let you drift away.
> 
> In addition to the authentication, it's important to monitor
> reachability of the peers.

One more time, if time is critical to your operation you have several
sources to include local GPS and CDMA NTP boxes.

 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Maarten Wiltink
 wrote in message
news:5lpu58-278@mail.specsol.com...
> Uwe Klein  wrote:
[...]
>> The $something trading solutions that require exact timematch
>> ( remember the recent rush of ntp users
>>   requiring u-second global time match )
>> over a set of widely distributed hosts allow fraud in
>> various ways if you can manipulate the time for some select host.
>
> One more time, if time is critical to your operation you do NOT have
> one and only one NTP server.
>
> You have serveral servers with local GPS and CDMA NTP boxes.
>
> Let's see you spoof the Internet, GPS, and CDMA all at the same time.

I'll solve (the subproblems of) the big problems just like the little
problems. One at a time.

That there are other lines of defence is no reason to neglect any one
of them. Every single one is there in case the other ones fail. Any and
all of the other ones.

You do not improve security by stacking the lemon meringue walls higher,
or thicker.

Groetjes,
Maarten Wiltink


___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Uwe Klein

j...@specsol.spam.sux.com wrote:

One more time, if time is critical to your operation you do NOT have one
and only one NTP server.


One more time, the times of well designed protocolls
and infrastructure software are gone ;-)
Today the PHB and his idiot savant minions rule.


You have serveral servers with local GPS and CDMA NTP boxes.

Let's see you spoof the Internet, GPS, and CDMA all at the same time.



Pfft. you don't have to.

The GFC is not only witness to the haphazard portfolio of  products traded
but also the (lack of) basic understanding brought to financial infrastructure.

IMHO, It is not well designed with an eye on faulttolerance, congestion, ...

uwe

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread jimp
Uwe Klein  wrote:
> j...@specsol.spam.sux.com wrote:
> 
>> If you specify the server by IP address, how does that happen and who
>> would bother to do it?
> 
> The $something trading solutions that require exact timematch
> ( remember the recent rush of ntp users
>   requiring u-second global time match )
> over a set of widely distributed hosts allow fraud in
> various ways if you can manipulate the time for some select host.

One more time, if time is critical to your operation you do NOT have one
and only one NTP server.

You have serveral servers with local GPS and CDMA NTP boxes.

Let's see you spoof the Internet, GPS, and CDMA all at the same time.


-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Uwe Klein

j...@specsol.spam.sux.com wrote:


If you specify the server by IP address, how does that happen and who
would bother to do it?


The $something trading solutions that require exact timematch
( remember the recent rush of ntp users
  requiring u-second global time match )
over a set of widely distributed hosts allow fraud in
various ways if you can manipulate the time for some select host.


IP hijacking will disrupt a lot more than just NTP.


Elegance and not being caught out is everything.

uwe

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-25 Thread Miroslav Lichvar
On Thu, Mar 24, 2011 at 05:01:07PM -0700, Chris Albertson wrote:
> Security is so that you know you are not being spoofed.  Or if you are
> providing the time so that you can prove to your users that you are
> who you claim to be and are not spoofing them.
> 
> There is the chance that someone might "impersonate" one of your
> servers or a server you use. and then make a computer's clock be set
> to the wrong time.   Again "who cares" if you only use your computer
> to serf the web and read emails but what if you were a bank processing
> ATM or visa card transactions or worse a computer routing trans or
> airplanes or controlling stop lights.

There is one important thing I haven't seen mentioned here. A MITM
doesn't need to modify the NTP packets to seriously degrade your
timekeeping. He can exploit the PLL instability when undersampled and
by dropping and delaying the packets (up to maxdist, 1.5s by default)
he can fairly quickly throw your clock off and let you drift away.

In addition to the authentication, it's important to monitor
reachability of the peers.

-- 
Miroslav Lichvar
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread jimp
Steve Kostecke  wrote:
> On 2011-03-25, j...@specsol.spam.sux.com 
> wrote:
> 
>> Chris Albertson  wrote:
>>
>>> On Thu, Mar 24, 2011 at 2:26 PM,  wrote:
>>>
>>>
 When I see questions like this my first response is "Why all the
 bother?".

 There is nothing secret or proprietary about the time of day.
>>>
>>> Security is so that you know you are not being spoofed. Or if you are
>>> providing the time so that you can prove to your users that you are
>>> who you claim to be and are not spoofing them.
>>
>> The question was about clients authenticating to the server.
> 
> NTP Authentication authenticates the server to the clients. It is not a
> client access control mechanism.

Yeah, I know, I should not have put "to" between the words "authenticating"
and "server".

It would be impossible to spoof a proper NTP setup where time is critical.

If time is critical, a proper setup would have multiple servers as well as
multiple independent, local sources like GPS and CDMA.
 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread jimp
Chris Albertson  wrote:
> On Thu, Mar 24, 2011 at 4:18 PM,   wrote:
>> Hal Murray  wrote:
>>> In article ,
>>> j...@specsol.spam.sux.com writes:
>>>
When I see questions like this my first response is "Why all the bother?".

There is nothing secret or proprietary about the time of day.

Since all NTP servers provide UTC, the service reveals nothing about the
machine other than the fact that the clock is correct.

If you don't want your resources utilized by outsiders, you just block
access to the NTP port for everyone but your own clients as a blocked
port uses less resources than denying an unsucessful authorization does.

Am I missing something??
>>>
>>> Yes.  The encryption also verifies that you are talking to the
>>> server you think you are talking to rather than an imposter.
>>
>> If you specify the server by IP address, how does that happen and who
>> would bother to do it?
> 
> The most obvious and easy way is that I cut the wire that goes from
> your house to your ISP and place a computer (and modems)  at the cut
> point.  It can change any bit in any packet.  I would not bother with
> your house but a bank, maybe.

Childish fantasy that shows zero understanding of how such things work.

> If I could make transactions that were backdated I could make a lot of
> money even if only slightly back dated by 10 seconds.

Yeah, if you could do that, but you can't.

>> IP hijacking will disrupt a lot more than just NTP.
> 
> It can but,  that is up to the hijacker.   A "man in the middle"
> attack can filter network packets and change only the bits he wants
> changed

Yeah, right, like the time in NTP packets.

>> If your server and its clients are on a corporate network, which is the
>> usual case for having one's own server, how does this happen?
> 
> Outsider has taken control of a computer that lives inside your network

If that happens you have a lot more to worry about then the time on some
client machines, like your total lack of competence.

> In general your arguments follows a common mistake.  It is equivalent
> to  "I can't figure it out so therefor it can't happen".   It is never
> valid to argue "it's imposable because I can't figure any way to".
>   To claim something is imposable you need something that is very
> much like a mathematical proof.

I never claimed it is "impossible" to disrupt an NTP server.
 
My arguement is that if the correct time is important it is trival
to ensure that with a proper setup and without jumping through hoops.
 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Re: [ntp:questions] Secure NTP

2011-03-24 Thread Dave Hart
On Fri, Mar 25, 2011 at 01:36 UTC, Chris Albertson
 wrote:
> The most obvious and easy way is that I cut the wire that goes from
> your house to your ISP and place a computer (and modems)  at the cut
> point.  It can change any bit in any packet.  I would not bother with
> your house but a bank, maybe.

It may be the most obvious way, but it sure isn't the easiest.
Physical access on the last mile?  How 1930s.

The easiest way is to snoop and/or man-in-the-middle traffic at a
point close enough to the end user that all the user's traffic is on
one wire, yes.  Such as the ISP PoP.  There you can intercept or
man-in-the-middle using commodity ethernet tools, avoiding expensive
specialized equipment specific to the access technology (DSL, cable,
wireless).

Now, ISP Points of Presense are not palatial, they are likely to be
crammed with equipment and only the minimum space available for human
operators, who largely configure and control them remotely.  Getting a
piece of gear in there is challenging on several levels.

But not to fear, at least here in the Land of Liberty, the so-called
birthplace of freedom, where 1994's CALEA (revised in 2005)
intentionally has opened up our telecommunications networks to easy
remote-controlled interception, and probably provides much of what's
needed for remote MiTM, especially with CALEA access to both source
and destination networks.  Telcos and ISPs much provision and pay for
equipment and services scaled to spy on 10% of their traffic at any
one time, IIRC.

To understand just how evil this law is, you must appreciate that much
if not most government wiretapping in the US is extralegal.  That's a
polite way of saying unconstitutional, illegal, and known to be so to
the government agents committing said crimes.  CALEA doesn't have
anything to say about what is legal to wiretap, that's left to the
courts.  It is simply ensuring that telecommunications have a gaping
backdoor that at least the few legal wiretaps can use, with the
convenient side effect that such automated spying can be easily abused
by those who do not need to be able to produce the evidence at trial
and therefore actually concern themselves with the Constitution.

I bet CALEA-mandated backdoors are used much more by private
detectives, intelligence agencies, and law enforcement more interested
in information than legally-defensible wiretapping, than it is for the
supposedly primary purpose.  I may be paranoid and deluded, or I may
be a realist familiar with the long history of illegal wiretapping by
government agents.  I'm no expert.  I am a fundamentalist when it
comes to the US Constitution and Bill of Rights, so I've intentionally
avoided learning more than broad generalities about CALEA, for fear of
suicidal depression or revolutionary violence.  I know enough about
the requirements to realize 10% is orders of magnitude
overprovisioning for legal intercepts, and can only infer those behind
CALEA very much intended to support criminal wiretapping, at least by
governments.  I take it for granted that anyone with money or
government power can intercept any telecommunciations they care to,
and it's my responsibility to encrypt things I don't want others to
see.

Revolutionarily depressed,
Dave Hart
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Re: [ntp:questions] Secure NTP

2011-03-24 Thread Chris Albertson
> NTP Authentication adds signatures to the packets. There is no
> encryption.

What are "signatures"?How are they generated?

Signatures are typically encrypted hashes of the message.  They are
typically used when you don't really care to hide the content of the
message but you do want to verify the sender of the message.
Signatures depend on cryptography



-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread Steve Kostecke
On 2011-03-25, j...@specsol.spam.sux.com 
wrote:

> Chris Albertson  wrote:
>
>> On Thu, Mar 24, 2011 at 2:26 PM,  wrote:
>>
>>
>>> When I see questions like this my first response is "Why all the
>>> bother?".
>>>
>>> There is nothing secret or proprietary about the time of day.
>>
>> Security is so that you know you are not being spoofed. Or if you are
>> providing the time so that you can prove to your users that you are
>> who you claim to be and are not spoofing them.
>
> The question was about clients authenticating to the server.

NTP Authentication authenticates the server to the clients. It is not a
client access control mechanism.

-- 
Steve Kostecke 
NTP Public Services Project - http://support.ntp.org/

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread Steve Kostecke
On 2011-03-24, Hal Murray  wrote:
> In article ,
>  j...@specsol.spam.sux.com writes:
>
>>When I see questions like this my first response is "Why all the bother?".
>>
>>There is nothing secret or proprietary about the time of day.

[snip]

>>Am I missing something??
>
> Yes.  The encryption also verifies that you are talking to the
> server you think you are talking to rather than an imposter.

NTP Authentication adds signatures to the packets. There is no
encryption.

-- 
Steve Kostecke 
NTP Public Services Project - http://support.ntp.org/

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread jimp
Chris Albertson  wrote:
> On Thu, Mar 24, 2011 at 2:26 PM,   wrote:
> 
> 
>> When I see questions like this my first response is "Why all the bother?".
>>
>> There is nothing secret or proprietary about the time of day.
> 
> 
> Security is so that you know you are not being spoofed.  Or if you are
> providing the time so that you can prove to your users that you are
> who you claim to be and are not spoofing them.

The question was about clients authenticating to the server.

See below.

> There is the chance that someone might "impersonate" one of your
> servers or a server you use. and then make a computer's clock be set
> to the wrong time.   Again "who cares" if you only use your computer
> to serf the web and read emails but what if you were a bank processing
> ATM or visa card transactions or worse a computer routing trans or
> airplanes or controlling stop lights.
> 
> If I were smart enough to remotely control a computer's time, then I
> could maybe make stock trades with an effective trade date of four
> hours ago.  I could make a fortune.

If the time on a client is that important, you run multiple local servers
with backup like a GPS NTP box and you don't depend on getting the time
across the Internet.

If the time on a client is only "kind of" important, you still run multiple
servers, which means a majority of your servers would have to be spoofed
in sync before it would have any effect on the clients.

If your clients and server are on your local network, it is not very likely
your servers are going to be spoofed, and if it is you have bigger issues
than the time of day.




-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread Chris Albertson
On Thu, Mar 24, 2011 at 4:18 PM,   wrote:
> Hal Murray  wrote:
>> In article ,
>> j...@specsol.spam.sux.com writes:
>>
>>>When I see questions like this my first response is "Why all the bother?".
>>>
>>>There is nothing secret or proprietary about the time of day.
>>>
>>>Since all NTP servers provide UTC, the service reveals nothing about the
>>>machine other than the fact that the clock is correct.
>>>
>>>If you don't want your resources utilized by outsiders, you just block
>>>access to the NTP port for everyone but your own clients as a blocked
>>>port uses less resources than denying an unsucessful authorization does.
>>>
>>>Am I missing something??
>>
>> Yes.  The encryption also verifies that you are talking to the
>> server you think you are talking to rather than an imposter.
>
> If you specify the server by IP address, how does that happen and who
> would bother to do it?

The most obvious and easy way is that I cut the wire that goes from
your house to your ISP and place a computer (and modems)  at the cut
point.  It can change any bit in any packet.  I would not bother with
your house but a bank, maybe.

If I could make transactions that were backdated I could make a lot of
money even if only slightly back dated by 10 seconds.

>
> IP hijacking will disrupt a lot more than just NTP.

It can but,  that is up to the hijacker.   A "man in the middle"
attack can filter network packets and change only the bits he wants
changed
>
> If your server and its clients are on a corporate network, which is the
> usual case for having one's own server, how does this happen?

Outsider has taken control of a computer that lives inside your network

In general your arguments follows a common mistake.  It is equivalent
to  "I can't figure it out so therefor it can't happen".   It is never
valid to argue "it's imposable because I can't figure any way to".
   To claim something is imposable you need something that is very
much like a mathematical proof.


-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread jimp
Hal Murray  wrote:
> In article ,
> j...@specsol.spam.sux.com writes:
> 
>>When I see questions like this my first response is "Why all the bother?".
>>
>>There is nothing secret or proprietary about the time of day.
>>
>>Since all NTP servers provide UTC, the service reveals nothing about the
>>machine other than the fact that the clock is correct.
>>
>>If you don't want your resources utilized by outsiders, you just block
>>access to the NTP port for everyone but your own clients as a blocked
>>port uses less resources than denying an unsucessful authorization does.
>>
>>Am I missing something??
> 
> Yes.  The encryption also verifies that you are talking to the
> server you think you are talking to rather than an imposter.

If you specify the server by IP address, how does that happen and who
would bother to do it?

IP hijacking will disrupt a lot more than just NTP.

If your server and its clients are on a corporate network, which is the
usual case for having one's own server, how does this happen?
 

-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread Chris Albertson
On Thu, Mar 24, 2011 at 2:26 PM,   wrote:


> When I see questions like this my first response is "Why all the bother?".
>
> There is nothing secret or proprietary about the time of day.


Security is so that you know you are not being spoofed.  Or if you are
providing the time so that you can prove to your users that you are
who you claim to be and are not spoofing them.

There is the chance that someone might "impersonate" one of your
servers or a server you use. and then make a computer's clock be set
to the wrong time.   Again "who cares" if you only use your computer
to serf the web and read emails but what if you were a bank processing
ATM or visa card transactions or worse a computer routing trans or
airplanes or controlling stop lights.

If I were smart enough to remotely control a computer's time, then I
could maybe make stock trades with an effective trade date of four
hours ago.  I could make a fortune.



-- 
=
Chris Albertson
Redondo Beach, California
___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread Hal Murray
In article ,
 j...@specsol.spam.sux.com writes:

>When I see questions like this my first response is "Why all the bother?".
>
>There is nothing secret or proprietary about the time of day.
>
>Since all NTP servers provide UTC, the service reveals nothing about the
>machine other than the fact that the clock is correct.
>
>If you don't want your resources utilized by outsiders, you just block
>access to the NTP port for everyone but your own clients as a blocked
>port uses less resources than denying an unsucessful authorization does.
>
>Am I missing something??

Yes.  The encryption also verifies that you are talking to the
server you think you are talking to rather than an imposter.

-- 
These are my opinions, not necessarily my employer's.  I hate spam.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread jimp
Yessica  wrote:
> Hello!
> I am installing an NTP server, but requires authentication for that
> clients can be synchronized with the server, and also that
> authentication should be with public and private keys. Let me know if
> I can work with certificates issued by any authority or can only use
> the certificates generated by the ntp-keygen.
> 
> Thank you very much!
> I hope you can answer.
> 
> PS: I'm working with ntp v4

When I see questions like this my first response is "Why all the bother?".

There is nothing secret or proprietary about the time of day.

Since all NTP servers provide UTC, the service reveals nothing about the
machine other than the fact that the clock is correct.

If you don't want your resources utilized by outsiders, you just block
access to the NTP port for everyone but your own clients as a blocked
port uses less resources than denying an unsucessful authorization does.

Am I missing something??


-- 
Jim Pennino

Remove .spam.sux to reply.

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions


Re: [ntp:questions] Secure NTP

2011-03-24 Thread David L. Mills

Yassica,

In principle, NTP Autokey can use certificates generated by OpenSSL or 
by other certificate authorities (CA); however, there are some very 
minor details with these certificates, including the sequence number and 
use of the X.500 extension fields. Ideally, the CA would run the Autokey 
protocol and serve as the TH itself, which would be consistent with the 
TC model. Absent that, the choice is to use the certificates generated 
by the ntp-keygen program.


Yessica wrote:


Hello!
I am installing an NTP server, but requires authentication for that
clients can be synchronized with the server, and also that
authentication should be with public and private keys. Let me know if
I can work with certificates issued by any authority or can only use
the certificates generated by the ntp-keygen.

Thank you very much!
I hope you can answer.

PS: I'm working with ntp v4

___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions
 



___
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions