Re: [chrony-users] NTS fallback? |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-users Archives
]
- To: chrony-users@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: [chrony-users] NTS fallback?
- From: kross@xxxxxxxxxxxxxxxxxxxx
- Date: Fri, 8 Aug 2025 10:58:54 +0200
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=kaffeeschluerfer.com; s=s31663417; t=1754643534; x=1755248334; i=kross@xxxxxxxxxxxxxxxxxxxx; bh=A+ruFPV/bhsZoV2un8V9fPx1uzHDY7YpVhEOhY/JRlg=; h=X-UI-Sender-Class:Message-ID:Date:MIME-Version:Subject:To: References:From:In-Reply-To:Content-Type: Content-Transfer-Encoding:cc:content-transfer-encoding: content-type:date:from:message-id:mime-version:reply-to:subject: to; b=SQCP/+HAlDj6Dy+pl9MT8f3Xx+asjeN0McFNOfWSpODgXkP5abJwiyr1Laa2dZhf ih18RgmURQh//hSZVE7laB9eUpYMG9X8V+S6hxEoBd6wv+kcFXVpF1sVS/HcA8CGD 7ny4omDbXrOEih9dqUPWsAUpGMjt73JYk76FhrBgYavUoM6oHH/9ai8WG9PMwDA2Z Dw8vymYSyb/dIUSksSWqzixYYlcQ88piVWlBKc1UhurdMHebri4hsaJ5JgDwAShEB 8cPA4TvxK8oHP2h7PK9H01ovxFzVqhjsBaqzp22cAFVxXtstbLWbq/Nb4lhbeTUrz CqwZpEt26qHzAze9RA==
- Ui-outboundreport: notjunk:1;M01:P0:CzAuYtvyJc4=;O0rziflno+9t13M+ySw3VKYsI7E euQ6o+BWpZkM1vLPgP+PogaAs8j2BWRDYToePXzZN9xJTDbafVOheOzGZigJmYKChXcyo3Me9 M3DBOXz5nkDDG318a+d/iDQoPaRamDgdM2IpbadxaKUoo9QhHW+HXAMDwsNGCLC5DMwLgbdk8 T1+SYHIi/MZyhf5G7MYq/kjqLHeJ8D68Nh48206aXOXw9UD+tDe1XFdKKX8xCkTNL5OfiSeyQ NyoTdBfUIYuhILL0w4m3J6AtynRatyaeCeO47qqDNk5pa+v+yf6v9wEyHcE/kvUQZIxjaMT68 6Pp75rHwYl3/qgfsUP9cL8r4xBHVU8veamXdEP0eOFmKBDWxxBPqnpEajmAZ/+PBsXU1456tE IWdjshr+tOFcvHVOzGaq5QP960OQ/KtzjLejA9HQ7qAktq9hAiD5ed+FjNwkIgTQwmnMde5J4 k5ywicTY0ziJbq8a1ATxkM1QN0y+xpXP0EZSNgSzA3sUi8d1lZASarPfy21KeHNKX1awB7hF6 zXNbMlcHnoZB4WdzOlBHnh8UI9Xl40ckWftmZYwJ4G5lxikXjkqScCqLPe8Ly63USiSNHTtpu wjW33w9MBR+nemL44mYnV8xTkpbb7PU3jQ/ETRND9AawVa/wM76kxi53Y0ZksztZcqcMW6qcv MqPJc/1yKZo29niTAoB4YEjKSnWvxb0EyqAulomih6nMCpealRscknSK7opCEtl0B8fh+FIbE iYtrv5arzzGjbBIHbsX5yJGixZUmRk0LZ3OT5DeFXXbmn1EIjhuKI8jSw7GC0g11H7V8ibVVh epQ4/dbPCg5r39sqZvvbq6iV3005EVJ2LImckUnhSJNWRbRw/22+CMXV5mKCsZYDiEK/tBrAD uQ5lHgk008FUGKKoTJqoUPPd5Q3D1CAlxJ/NCz77G5vVME+s2sxIioVbHaRIsSruifJAlZ6+/ kpn9qQozJG8ikXC+zurwHJ2Kb8K1SqB+H/Sx98nfZyvQuh0/487U3PSsM9gBxgnbkJYgZFmcT +UxCYrHJK9DIURDd/RRmxkX8GzK+VB04x6YVmUz82rlPCeU/DIGoFPBu1K58rtprgYpC9/ZPO v85bjssazuTqDBChLa6YeUf2zbzAKvpB9hyETS4TnrekJ/OfWP1/D7y8KU8Ed/qtrubFA6/25 fbqpIPqdeJzS/Yh7dNKrDZ+NV7J5Br2MdeCZj/RKzxK8/nVwGYSSoBCQXg/n1FJamV8pRkURL VLsSFwCbNnafxyVMy+fU+AqzjJ21ezBVNPwHRwZ9vjEFgF07wkq100LxhL0o4Y9wLK7bFk1K0 P4xnf+HRdDRGL9mH36SSXnsgjuDuwBA8nP6CK3ZHQvs0QWmqXh3JMjNCLhZq0HVON7misQsGp 24wpupIZLwotM7TTVxglFECKT5K7xnkBwGBrf8r84t7532ZBXr31yZKa+reEDHLpK4swntDfR sX/2EpdafDQN8SeWdbF0iI7u6KCzAHLUVtkDGR5JrJGl4TRBsLsdhGyb3sbSDlTpZdbgqK3Sg rNJoJezy+OqBsKxiprk6wLKFjoo0fWvXpndvYbTBDozsVprWixnwdiftsWIsv7DSenlyZnYeF mpkQKaDz6KjMPjluyKnkYjY7tV460mOR6CrU/ik2KAF5IWmqgq8hq9rJakE5zn9tqeILkf+Ty h0yORMOwKVmdxth54ljI3iXCp85ZNaTlBdZQGGp4SJY0PxJUb7UC1odBbgHcVipCshqYhXZdy E3AqfIQo6a07xrqw1lCyTbxwhV7ZLV02gwJBGOZtqCmhHX4VJIV3NYXH53U1rlEbJ8iJNAxdr 0ppa7T4Y2+HHiJnxkGhe2B5BOR82R6hDkqEsZoZSOsqMJ/Y7p5/z34thgCyiR5eH83owwGSKQ DH3tFf2AywI6L5Np8V3gM5H1DKUPIcOasQQaLvvZVW+ryF86/39yIHmNdavw3jQv2IpVbfxDW ZKpHdoyy36/JiwX5owROoL84cNmrc6r+eRz+GPhMR/Sq/Dmi0eC5r1Va1gKBm+tBvbRRkCy9p EzQV9cG3shu0/++iS3Wu0KvPhjyHTt7Ml+8dYekngLR5oJYPDiJUvG0g6AM6RyM76lI/xOtIM aPT40WEtRLO15e0YF2hiLm7g+srBmL1wGRfodes2Vd+rOcyomZvgX9CrIlVTgVlhLhdQ5RXKO l0CKii6ebRnKmo27/MR7B36c7QMCAyKyTDktaIZPnpYHZbei1bKaJs+qrUWYOsgJeho6HEa4i /SDUuBpp39pdnIMYSiB4QbvLgeHuDc5Ll2oR5P4xbnLGwes7rYAqLFiLQzTg8cp7ftKOsCHLO i5/O4TJzOItcHVRSWKdM9BnhsY2XmHU0BHeEoeFAhR14467rJkYM+gkmnNUK61lYmPcPvPzIs jglZy2Frg/nGeH/QgCElTqc9IR8CZKgyDUEZs1ahDRLCKumgaJ0P9JX65drRXjynoLe3PWpoz NAFUEMeQc08SBzBuVV2yxfisK2BRWba5tAXPlE+4ZODSrk8WmN2p6NIgSf75WjAVcL+A2Z7G5 yGKjBGjkFxOmC+dgpJL+95iFvMqySAggkd0jHBywP/vidQ0jhGs4haEBFhfXGxoCZQVOhhDdw aAX/NdXgqfKY97NBmSCdf8ozbqsMKmonCK+Wg3NeVTDgbkqaaCAjjY6g8QD55CFkMw2xIslTt FvJcBoLUH53W0W2GGBY3OLMRoOqPrgyBbj0JPkhQghuGJRIJPtj4jn8JijE/bI+xMPD7oOzom +FGfe5gKT/ggzhAcHeB6fLhvnHPS/TccMMhBzNaBGiBX3lvjSv0gdFT0UOEsOsEDICTecIvx2 NRrd5tNY3Ia+egVpT3L6FLzZ+fCJPLkXTfXQW4rq38ae/Y2x1FSGCa3it+bxWq7b9gxrnDydX 9MDdkag9PhnmBy52lCxHpNRnavHdGE4cIaFVmMQaJ/pVCQMSM+18F0T69hzxAVsVAmQTuhsqb opwfJZSUcLWEMMjLCU/s8PgmopkuMgQiLCDaZN9/fif68m46TgzdoyZZ23Sc83BKSFGCnJxYQ 9dtL2uUcezFWnxdw8BeoWu9Bto8CCqGFdOl+iPOMzzCyOGm1eEWbfrvdEPewbpKsGJkSpAoVC v3fLs1q/oMQYFhkDdZB7a5n/f4ReEi3sO4PdGif/kmnpTuQ8a0hwY7/LfHXnbicZHH6QuXdlB qaBudIMqU5Uvs2FTd+HgYKthc7qWgaTlFGNpnuSCzeBAQBtgubVYyMKBOjhPHX3kU9969BaHk FRU4JsTRMALkiuvhhlLik1mVKHN7/wnN0JPtQg==
Hello Christoph,
The question to me is why you'd want to use NTS in the first place for
the use cases you hint at?
NTS gives certain security guarantees (as far as that can be done).
Saying one wants to have a silent fallback to just ignore NTS when it
doesn't work suggests to me that the point isn't about actual security
at all, in the sense of what NTS is intended to provide. Rather, it
sounds like NTS is being used just for the sake of it, because it's
there, because it sounds nice, because it gives a warm, fuzzy feeling, ...
It's like having a highly secure, reinforced door with all kinds of
locks and security mechanisms as your front door, and then hanging the
keys and security codes on the door knob. Or leaving the porch door
right next to the locked front door wide open.
Other protocols such as HTTPS are going to great lengths to avoid just
this kind of scenario, and to reduce the options to bypass security
mechanisms.
In my view, the existing and appropriate fallback is to let the NTP
client operator _explicitly_ decide not to use NTS for servers that
don't support it, or where its operation is unreliable due to a number
of potential factors. Otherwise, it gives a false sense of security,
when there actually isn't any security at all.
Or the already existing configuration options, which you cite as well,
of combining unprotected and NTS-protected sources in various way. E.g.,
get time from a high-quality/accurate, but possibly unprotected source,
and use NTS-protected sources for sanity-checking. The existing
configuration options should cover a wide range of scenarios.
Kind regards,
Joachim
On 08.08.25 10:28, Christoph Schittel wrote:
Thank you Joachim,
I see, this makes perfect sense!
Nonetheless I think there are setups where it would be helpful to have
this fallback. With "authselectmode" it can be decided if
unauthenticated servers will be used and how.
There could be a timeout option "authfallback" with an integer parameter
giving the number of tries after which chrony should use unauthenticated
queries when authentications fails. Authentication request should
nevertheless be tried in parallel. An parameter of zero would be the
default behavior - no fallback.
regards,
Christoph
kross@xxxxxxxxxxxxxxxxxxxx schrieb am Donnerstag, 7. August 2025
23:20:42 (+02:00):
> Hello Christoph,
> > The idea is to prevent so-called "bidding down" attacks. I.e.,
instead of trying to attack the protection mechanisms, the idea of such
stracks is to get the client to simply not use them. Not falling back to
NTP without NTS when NTS fails is a way to avoid that, i.e., is fully
intended.
> > Kind regards
> > Joachim
> > 07.08.2025 22:22:03 Christoph Schittel <christoph.schittel@xxxxxxxxx>:
> > > Hello!
> > > > When a server directive is specified with "nts" this server is
only queried when nts service is working on this server.
> > Is there no fallback to unauthenicated time transfer for servers
with nts option given? Like when nts services are failing or temporarily
disabled on the server.
> > > > I know about "authselectmode", but this is only working between
different queried servers, authenticated and not authenticated.
> > > > regards
> > Christoph
> > > > -- > > To unsubscribe email chrony-users-
request@xxxxxxxxxxxxxxxxxxxx with "unsubscribe" in the subject.
> > For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx with
"help" in the subject.
> > Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.
>
--
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.