Network Time Protocol Hardened To Protect Users From Spying, Increase Privacy (theregister.co.uk) 51
AmiMoJo quotes the Register: The Internet Engineering Task Force has taken another small step in protecting everybody's privacy... As the draft proposal explains, the RFCs that define NTP have what amounts to a convenience feature: packets going from client to server have the same set of fields as packets sent from servers to clients... "Populating these fields with accurate information is harmful to privacy of clients because it allows a passive observer to fingerprint clients and track them as they move across networks".
The header fields in question are Stratum, Root Delay, Root Dispersion, Reference ID, Reference Timestamp, Origin Timestamp, and Receive Timestamp. The Origin Timestamp and Receive Timestamp offer a handy example or a "particularly severe information leak". Under NTP's spec (RFC 5905), clients copy the server's most recent timestamp into their next request to a server – and that's a boon to a snoop-level watcher.
The proposal "proposes backward-compatible updates to the Network Time Protocol to strip unnecessary identifying information from client requests and to improve resilience against blind spoofing of unauthenticated server responses." Specifically, client developers should set those fields to zero.
The header fields in question are Stratum, Root Delay, Root Dispersion, Reference ID, Reference Timestamp, Origin Timestamp, and Receive Timestamp. The Origin Timestamp and Receive Timestamp offer a handy example or a "particularly severe information leak". Under NTP's spec (RFC 5905), clients copy the server's most recent timestamp into their next request to a server – and that's a boon to a snoop-level watcher.
The proposal "proposes backward-compatible updates to the Network Time Protocol to strip unnecessary identifying information from client requests and to improve resilience against blind spoofing of unauthenticated server responses." Specifically, client developers should set those fields to zero.
proposal, should, and all that. (Score:1)
I have since long given up on other peoples NTP. (Score:2, Interesting)
http://www.leobodnar.com/shop/... [leobodnar.com]
Stratum1 FTW!
Re: (Score:1)
Re: (Score:1)
I assume you mean because GPS is run by government? Meh. as long as governments (mulitple) are using the same time source I actually trust it quite a bit. Besides, atomic clocks essentially mean trusting government too... they are ALL either directly or indirectly funded by governments, even one you buy yourself for personal use.
Re: (Score:2)
Re: I have since long given up on other peoples NT (Score:2)
My stratum 1 server also receives timing from the Russian glonass constellation. American GPS is not the only game in town, and hasn't been for many years.
Re: (Score:2)
Wowsers that's a lot of money. You can get PPS out of neo8m
Re: (Score:2)
Re: (Score:1)
Check your protocols.
Actually, establishing (and tearing down) an encrypted TCP channel is far less simple than UDP based ntp.
The open port isn't a requirement, but it is how ntp does the important (and complicated) part - establishing what the real time actually is, without blind faith in just one other server.
Re: (Score:3)
Re: (Score:2)
Local NTP is probably a bit more secure (Score:5, Interesting)
Very simple to code. Cost me $50, and pretty much only because I wanted one that could handle multiple constellations. Or buy one off the shelf. More expensive, less work.
Re: (Score:2)
Just be sure to avoid setting your watch during an earthquake.
Re: (Score:3)
Use HTTPS over UDP (Score:2)
Perhaps a better solution (Score:2)
Fill the fields with plausible garbage. If the data has no legitimate usage, poison it.
Re: (Score:2, Insightful)
But if everyone's garbage is different it's unique, and thus identifying, information.
Re: (Score:2)
Fill the fields with random garbage each time a request is made. That way you create more and more seemingly unique entities to track. If you can't beat/avoid the DB, fill it with garbage.
Slippery Jim DiGriz
https://en.wikipedia.org/wiki/... [wikipedia.org]
Re: When time.windows.com... (Score:4, Insightful)
Re: (Score:2)
OTP (Office Time Protocol) predates even that one by decades, and is probably more accurate than Microsoft's NTP:
Hey Jim, what time is it?
About five-ish
Beer o'clock?
Yeah, about that.
Never failed so far.
Re: (Score:2)
Re: (Score:2)
can't even get the time correct, we should be focusing on reliability instead of security.
That's a normal behavior. Windows has always been a few years behind.
Watch very closely. (Score:2)
Anytime anybody says they are doing something "to protect you from spying" or to "increase your privacy" You would do well to watch very closely and try to read between the lines. Sometimes your just a paranoid nutcase. Sometimes.
Simple solutions (Score:1)
So here's the thing. Replace NTP as the wide spread time protocol with one that uses a round trip timer over HTTPS for get time requests and changes are the precision is good enough.
Most enterprise and industrial environments don't need precision time,
Re: (Score:2)
Linux doesn't need "real time extensions". Linux has had soft realtime support in the mainline kernel for a frigging decade. Furthermore, clock drift is "a thing" everywhere. If it were not then there would be no need for NTP.
Re: (Score:2)
It's amusing that you think being real-time has anything to do with keeping time.