On Thu, 3 May 2007, [EMAIL PROTECTED] wrote:

Thanks for your reply Paddy ! ;-)

>> Anybody ? Anything wrong with what I am suggesting ??
>
> What you are describing, I would call a firewall.  It is supposed to protect
> those in other compartments when things blow up.

Indeed what I am suggesting is definitely called Destination Address 
Network Translation at it definitely takes place at what we usually call 
the firewall level. It has to be a stateful firewall. Note that more 
and more devices offer firewall AND routing capabilities in 2007 and that 
most of them are now stateful.
>
> In an ideal world, it wouldn't interfere with normal usage, whatever
> that is.
> And, in an ideal world, it wouldn't be used as an excuse to allow other
> stuff to remain broken: that path leads to trouble.
>

-In an ideal world, I wouldn't put metal detection devices at the gates of
airports. I would educate everybody so they don't blow up the planes. ;-)

I agree that path could cause trouble, but if the trouble is worth the 
gains, then it should be fine. Then again, I said I am currently using 
that solution on live networks and I have seen 0 problems so far, I 
think it should be worth investigating a little more seriously.

Here is what happens with that config, from inside a LAN a machine 
configured with 7 different ntp sources. The LAN machine thinks the 7 
sources return approximately the same time, that's it ! The LAN machine
thinks it is talking to 7 different ntp servers thanks to DNAT. All 
queries are answered by the same ntp servers in reality.

And no, it doesn't break anything. It could only break things if an 
application would try to use udp 123 for other purpose than ntp. I am not 
aware of any other applications using udp 123 except trojans or malicious 
software so it seems safe to do this. In short, DNAT was made to handle 
this very type of use case.

:~# ntpq -pn
         remote   refid      st t when poll reach   delay   offset  jitter
==============================================================================
+18.26.4.105     .USNO.           1 u  279 1024  377   28.254    1.613   0.268
-206.223.0.15    .USNO.           1 u  254 1024  377   28.406    1.331   4.226
*18.145.0.30     .USNO.           1 u  375 1024  377   28.322    1.488   0.183
+64.230.172.46   .USNO.           1 u  135 1024  377   28.389    1.578   0.115
+64.230.159.74   .USNO.           1 u  222 1024  377   28.398    1.479   1.144
-128.233.150.93  .USNO.           1 u  204 1024  377   28.277    1.399   5.980
+128.233.154.245 .USNO.           1 u  263 1024  377   28.448    1.543   5.574


:~# ntpq -pn 18.26.4.105
      remote           refid      st t when poll reach   delay   offset  jitter
==============================================================================
*127.127.21.0    .USNO.           0 l    1   16  377    0.000    0.004   0.001
+10.1.4.40       .USNO.           1 u   16   64  377    0.158    0.021   0.006
-204.34.198.41   .USNO.           1 u    9   64  377   62.109   -0.179   1.448
-10.1.4.209      .USNO.           1 u   32   64  376    1.942    0.762   0.410
+10.1.4.85       .USNO.           1 u    2   64  377    0.175    0.046   2.273

:~# ntpq -pn 128.233.154.245
      remote           refid      st t when poll reach   delay   offset  jitter
==============================================================================
*127.127.21.0    .USNO.           0 l    4   16  377    0.000    0.004   0.001
+10.1.4.40       .USNO.           1 u    1   64  377    0.158    0.021   1.680
-204.34.198.41   .USNO.           1 u   43   64  377   62.109   -0.179   1.448
-10.1.4.209      .USNO.           1 u    3   64  377    1.986    0.897   0.333
+10.1.4.85       .USNO.           1 u   28   64  377    0.185    0.039   0.017


I see where you are coming from a purist standpoint although, I sure 
wouldn't like my own provider to play tricks like that on me !!! ;-)) hehehe...

But I still think it is OK to use DNAT for ntp in a lot of LAN setups.

>> If not, why isn't anybody else seeming to be doing or recommending this ?
>
> plenty of people promote the use of firewalls.

I am glad to hear this, I just wished more people promoted the use of DNAT 
in stateful firewall to handle their ntp traffic internally.

>
>> Could catching udp 123 outgoing request interfere with other applications ?
>
> The simple system you describe sounds like it is immediately going to
> screw with the expectactions of anyone carefully and deliberately using
> port 123 for anything but the simplest purpose, eg: checking one source
> against another.

See above, I haven't found one thing it breaks yet and I have searched and
searched, believe me.

> why not just block 123 at the firewall and provide an ntp service ?
>

That's an acceptable alternative !

1) It is less sneaky and more straight forward, forcing users to configure 
their devices properly.

2) But it risks to break more things, devices loosing their time. We have 
to think about all kinds of devices using ntp, not only the hosts 
running a full fledged OS. ( voip devices, printers, sip phones, modems, 
voip embedded servers, etc.)

As you can see, I am not a big believer into the chances of success of an 
ntp police forcing all users to reconfigure their devices ;-))

I'll rest my case now. I have expressed the idea many times on this list 
and I think there is no point in defending it anymore that I have 
already done.

I might set up a FAQ page showing how to do this with major 
brand firewalling and routing devices if I have time. If I do I'll post 
the link here but apart from that, that's it for me on this 
topic ! ;-)

Best regards,

Louis
http://www.pool.ntp.org/scores/74.14.248.210
http://www.pool.ntp.org/scores/207.236.226.149
_______________________________________________
timekeepers mailing list
[email protected]
https://fortytwo.ch/mailman/cgi-bin/listinfo/timekeepers

Reply via email to