network time security nts
play

Network Time Security (NTS) The Road to Deployment Karen ODonoghue - PowerPoint PPT Presentation

LACNIC 6 May 2020 Network Time Security (NTS) The Road to Deployment Karen ODonoghue Director, Internet Trust Technology odonoghue@isoc.org Presentation title Client name Humans have always measured time 2 Accurate time is


  1. LACNIC – 6 May 2020 Network Time Security (NTS) The Road to Deployment Karen O’Donoghue Director, Internet Trust Technology odonoghue@isoc.org Presentation title – Client name

  2. Humans have always measured time… 2

  3. Accurate time is vitally important. 3

  4. Where does accurate time come from? UTC  Time Reference Time Reference • A time source traceable to a (Clock) reference (e.g. UTC(USNO))  Time Dissemination • Distribution of time and Time Dissemination frequency information (e.g. GNSS)  Time Distribution and Synchronization Time • Distribution of time to users and Distribution applications (e.g. NTP and PTP) User

  5. Network Time Synchronization Two basic network time synchronization protocols: Network Time Protocol (NTP): Defined by the IETF • (RFC 5905) Precision Time Protocol (PTP) : Defined by IEEE • 1588 NTP and PTP both: Exchange time information over a network for • the purposes of clock synchronization Use this exchanged time information to • determine the offset between two independent clocks Form a hierarchical tree structure as the basis for • the distribution of time information Are somewhat resilient in the presence of packet • loss 5

  6. Security has not been a high priority of the time synchronization community in the past … • What has changed... Increasing interconnection and decentralization • Increasing evidence of the impact of inadequate security • Interdependency between security and time • Legal and Compliance requirements • 6

  7. Attacks are occurring… 7

  8. Vulnerabilities are being discovered… 8

  9. Multiple sources of problems… Flaws in Weaknesses in the configuration and actual protocol implementation itself Lack of adequate security mechanisms 9

  10. And yet… We had not had an updated specification for time synchronization security in 8+ years. Until 2020! 10

  11. IETF approach to the problem… Flaws in configuration and NTP Best Current Practice (RFC 8633) implementation of the protocol. Weaknesses in the Updated MAC for NTP (RFC 8573), protocol itself. NTP client data minimization, etc. Lack of adequate Network Time Security (NTS) security mechanisms 11

  12. Network Time Security (NTS) NTS Approved by IESG in March 2020!

  13. Network Time Security (NTS) NTS provides: NTS includes: • Integrity for NTP packets • NTS Key Establishment protocol (NTS-KE) • Unlinkability (once an NTS session has been • TLS to establish key material and established and if the client uses data negotiate some additional protocol minimization techniques) options • Request-Response consistency (for avoiding replay attacks) • NTS extensions for NTPv4 • Authentication of servers • A collection of NTP extension fields for • Authorization of clients (optionally) cryptographically securing NTPv4 using key material previously negotiated using • Support for NTP client-server mode only NTS-KE. • Suitable for client/server mode 13

  14. It’s time to focus on the road to deployment… 14

  15. Steps on the road to NTS deployment Technology / Standards Development Preliminary / Prototype Implementations Interoperability Testing Production quality open source implementations Commercial products Tools for testing and troubleshooting Preliminary deployments Lessons Learned and Best Practices Large scale deployments 15

  16. Internet Society Time Security Project Building a • Network operators community (of key • Time service providers collaborators) • Enterprise IT groups • Distributed multi-party testbed Maturing the NTS • Virtual test events products • Test and measurement tools Developing NTS • Lessons Learned and BCPs deployment • Monitoring Tools guidance Outreach to expand • Training NTS deployment • Resources 16

  17. It is Time to Act! The Internet Society is looking for potential collaborators: Network operators, developers, potential testbed • participants, time service providers Join us: Send email to odonoghue@isoc.org • Follow us: https://www.internetsociety.org/issues/time- • security/ Any questions? 17

  18. A few resources https://datatracker.ietf.org/group/ntp/about/ https://www.internetsociety.org/blog/2017/09/ti me-synchronization-security-trust/ https://www.internetsociety.org/resources/doc/2 017/new-security-mechanisms-network-time- synchronization-protocols/ https://www.netnod.se/time-and- frequency/network-time-security https://www.netnod.se/time-and- frequency/how-to-use-nts 18

  19. Thank you. Rue Vallin 2 11710 Plaza America Drive CH-1201 Geneva Suite 400 Switzerland Reston, VA 20190, USA Rambla Republica de Mexico 6125 66 Centrepoint Drive 11000 Montevideo, Nepean, Ontario, K2G 6J5 Uruguay Canada Karen O’Donoghue Science Park 400 3 Temasek Avenue, Level 21 1098 XH Amsterdam Centennial Tower Director, Internet Trust Technology Netherlands Singapore 039190 odonoghue@isoc.org internetsociety.org @internetsociety 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend