NTS dropping TLS 1.2

Mark Atwood mark.atwood at ntpsec.org
Tue Mar 24 01:58:21 UTC 2020


I think that our implementing this is a good reason for make a point release.

..𐑥𐑸𐑒
Mark Atwood <mark.atwood at ntpsec.org>
Project Manager of the NTPsec Project
+1-206-604-2198

On Mon, Mar 23, 2020, at 01:24, Hal Murray wrote:
> 
> A new version of the draft RFC is available:
>   https://datatracker.ietf.org/doc/draft-ietf-ntp-using-nts-for-ntp/
> 
> They decided to drop support for TLS 1.2.  Details way down.
> 
> They also tweaked the TLS export string used to make client-server keys.  That 
> will break things if the client and server don't use the same one, aka 
> everybody has to update in sync.  There is no way to detect the change.  The 
> symptom will be lack of response.  Stay tuned for more info, maybe a flag day 
> announcement.
> 
> ------------
> 
> OpenSSL has dropped support for older versions that don't support TLS 1.3.  
> That was roughly the start of 2020.  There used to be many more OSes that were 
> still shipping old versions of OpenSSL.  Most of them upgraded.  A few haven't.
> 
> The ones I know about that haven't upgraded are older (but still supported) 
> versions of CentOS, NetBSD, and probably Debian and Raspbian.
> CentOS runs old/stable code.  People running their old version are unlikely to 
> be interested in NTPsec or NTS.
> NetBSD is getting ready for a release that will drop support for the current 
> old/broken version.
> 
> I don't have an old version of Debian handy.  I do have old Raspbian which 
> usually tracks Debian.  It has an old OpenSSL.
> 
> I don't know about other OSes.
> 
> 
> You can tell if you have older clients by scanning your log files for 
> "TLSv1.2".  The server will say something like:
> 19 Mar 14:27:31 ntpd[30185]: NTSs: NTS-KE from 192.168.1.29:65366, Using 
> TLSv1.2, ECDHE-RSA-AES256-GCM-SHA384 (256), took 0.015 sec
> 
> If your client is talking to older servers, it will say something like:
> 22 Mar 06:42:19 ntpd[679]: NTSc: Using TLSv1.2, AES256-GCM-SHA384 (256)
> 
> Our current code supports TLS 1.2 with a handful of ifdefs.  (Actually, mostly 
> #if checking the version number.)
> 
> We can do several things:
>   1) clean out the ifdefs that make things work with older versions of OpenSSL.
>     That is drop support for systems that haven't upgraded their OpenSSL to a 
> supported version.
>   2) leave things alone, ignore the RFC.
>     Or maybe add some nasty warning messages
>     How long?
>   3) make a configure option to disable NTS so that NTPsec builds on older 
> OSes but doesn't support NTS.
> 
> I propose option 1.  Simple and clean.  I don't think we will drop many 
> systems.
> 
> --------------
> 
> (From ntp at ietf.org)
> 
> - No TLS 1.2
> During this work, it became apparent that keeping support for TLS 1.2
> and correctly covering for the differences between TLS 1.2 and TLS 1.3
> would be a lot of work, with the risk of getting something wrong or
> missing on important issues, in the specification or in the
> implementations.
> 
> The last time the issue of 1.2 support was up for debate, there were
> some operating systems that would not support TLS 1.3, and there was a
> concern that this would impair the protocol adoption rate. Today most
> (all?) major operating systems do have TLS 1.3 capable libraries in
> their later versions.
> 
> 
> 
> 
> -- 
> These are my opinions.  I hate spam.
> 
> 
> 
>


More information about the devel mailing list