Thanks for that link. This is jumping out at me though :
Their interior routing protocol used amongst their mesh of routers was > IS-IS which was using authentication. The authentication [section 4.19] > was described having a "password validity start date" of 01 July 2012. > Thus, any routers which had picked up the time from the faulty source no > longer had valid IS-IS authentication and were thus isolated. > It's been a while, but last time I remember diving into the IS-IS weeds , the time of the transmitting system wasn't part of a Hello. Is this a Cisco specific option they toss in a TLV? On Wed, Aug 16, 2023 at 9:04 AM Matthew Richardson via NANOG < nanog@nanog.org> wrote: > Mel Beckman wrote:- > > >Do you have a citation for your Jersey event? I doubt GPS caused the > problem, but I’d like to see the documentation. > > The event took place on the evening of Sunday 12 July 2020, and seems NOT > to have been due to an issue caused directly by GPS, but rather to > misbehaviour of a GPS NTP server relating to week numbers. Our regulator > subsequently issued the following comprehensive document:- > > > https://www.jcra.je/media/598397/t-027-jt-july-2020-outage-decision-directions.pdf > > By way of summary, JT operated two GPS derived NTP servers, with all of > their routers were pointing to both. On the evening in question, one of > the two reset its clock back to 27 November 2000. > > Their interior routing protocol used amongst their mesh of routers was > IS-IS which was using authentication. The authentication [section 4.19] > was described having a "password validity start date" of 01 July 2012. > Thus, any routers which had picked up the time from the faulty source no > longer had valid IS-IS authentication and were thus isolated. > > Whilst only 15% of their routers were affected, this was enough to cause an > almost total failure in their network, affecting telephony (fixed & mobile) > and Internet. For foreign readers (this is NANOG!) "999" calls refer to > the emergency services in these parts, where any failures attract the > attention of our regulator. > > The details of why the clock "failed" start at section 4.23, and seem to > relate a GPS week number rollover. > > So, probably not a failure "caused by GPS", rather one caused by poor > design (only two clock sources) combined with unsupported and buggy > devices. > > One curious aspect is that some routers followed the "bad" time, which is > alluded to in section 4.31. > > Something not discussed in that report is that JT's email failed during the > incident despite its being hosted on Office365. The reason was that the > two authoritative DNS servers for jtglobal.com were hosted in Jersey > inside > their network. As that network was wholly disconnected, there was no DNS > and hence no email. Despite my having raised this since with their senior > management, their DNS remains hosted in this way:- > > >matthew@m88:~$ dig +norec +noedns +nocmd +nostats -t ns jtglobal.com @ > ns1.jtibs.net > >;; Got answer: > >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 20462 > >;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 4 > > > >;; QUESTION SECTION: > >;jtglobal.com. IN NS > > > >;; ANSWER SECTION: > >jtglobal.com. 60 IN NS ns2.jtibs.net. > >jtglobal.com. 60 IN NS ns1.jtibs.net. > > > >;; ADDITIONAL SECTION: > >ns1.jtibs.net. 60 IN A 212.9.0.135 > >ns2.jtibs.net. 60 IN A 212.9.0.136 > >ns1.jtibs.net. 60 IN AAAA 2a02:c28::d1 > >ns2.jtibs.net. 60 IN AAAA 2a02:c28::d2 > > Rediculously (and again despite my agitation to their management) our > government domain gov.je has similar DNS fragility:- > > >matthew@m88:~$ dig +norec +noedns +nocmd +nostats -t ns gov.je @ > ns1.gov.je > >;; Got answer: > >;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4249 > >;; flags: qr aa; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2 > > > >;; QUESTION SECTION: > >;gov.je. IN NS > > > >;; ANSWER SECTION: > >gov.je. 3600 IN NS ns2.gov.je. > >gov.je. 3600 IN NS ns1.gov.je. > > > >;; ADDITIONAL SECTION: > >ns2.gov.je. 3600 IN A 212.9.21.137 > >ns1.gov.je. 3600 IN A 212.9.21.9 > > -- > Best wishes, > Matthew > > ------ > >From: Mel Beckman <m...@beckman.org> > >To: Matthew Richardson <matthe...@itconsult.co.uk> > >Cc: Nanog <nanog@nanog.org> > >Date: Tue, 8 Aug 2023 15:12:29 +0000 > >Subject: Re: NTP Sync Issue Across Tata (Europe) > > >Until the Internet NTP network can be made secure, no. Do you have a > citation for your Jersey event? I doubt GPS caused the problem, but I’d > like to see the documentation. > > > >Using GPS for time sync is simple risk management: the risk of Internet > NTP with known, well documented vulnerabilities and many security > incidents, versus the risk of some theoretical GPS-based vulnerability, for > which mitigations such as geographic diversity are readily available. Sure, > you could use Internet NTP as a last resort should GPS fail globally > (perhaps due to a theoretical — but conceivable — meteor storm). But that > would be a fall-back. I would not mix the systems. > > > > -mel > > > >> On Aug 8, 2023, at 1:36 AM, Matthew Richardson < > matthe...@itconsult.co.uk> wrote: > >> > >> ?Mel Beckman wrote:- > >> > >>> It's a problem that has received a lot of attention in both NTP and > >>> aviation navigation circles. What is hard to defend against is total > signal > >>> suppression via high powered jamming. But that you can do with a > >>> geographically diverse GPS NTP network. > >> > >> Whilst looking forward to being corrected, GPS (even across multiple > >> locations) seems to be a SINGLE source of time. You seem (have I > >> misunderstood?) to be a proponent of using GPS exclusively as the > external > >> clock source. > >> > >> Might it be preferable to have a mixture of GPS (perhaps with another > GNSS) > >> together with carefully selected Internet-based NTP servers? > >> > >> I recall an incident over here in Jersey (the one they named New Jersey > >> after!) where our primary telco had a substantial time shift on one of > >> their two GPS synced servers. This managed to adjust the clock on > enough > >> of their routers that the certificate-based OSPF authentication > considered > >> the certificates invalid, and caused a failure of almost their whole > >> network. > >> > >> This is, of course, not to say that GPS is not a very good clock source, > >> but rather to wonder whether more diversity would be preferable than > using > >> it as a single source. > >> > >> -- > >> Best wishes, > >> Matthew > >> > >> ------ > >>> From: Mel Beckman <m...@beckman.org> > >>> To: "Forrest Christian (List Account)" <li...@packetflux.com> > >>> Cc: Nanog <nanog@nanog.org> > >>> Date: Mon, 7 Aug 2023 14:03:30 +0000 > >>> Subject: Re: NTP Sync Issue Across Tata (Europe) > >> > >>> Forrest, > >>> > >>> GPS spoofing may work with a primitive Raspberry Pi-based NTP server, > but commercial industrial NTP servers have specific anti-spoofing > mitigations. There are also antenna diversity strategies that vendors > support to ensure the signal being relied upon is coming from the right > direction. It's a problem that has received a lot of attention in both NTP > and aviation navigation circles. What is hard to defend against is total > signal suppression via high powered jamming. But that you can do with a > geographically diverse GPS NTP network. > >>> > >>> -mel > >>> > >>> On Aug 7, 2023, at 1:39 AM, Forrest Christian (List Account) < > li...@packetflux.com> wrote: > >>> > >>> ? > >>> The problem with relying exclusively on GPS to do time distribution is > the ease with which one can spoof the GPS signals. > >>> > >>> With a budget of around $1K, not including a laptop, anyone with > decent technical skills could convince a typical GPS receiver it was at any > position and was at any time in the world. All it takes is a decent > directional antenna, some SDR hardware, and depending on the location and > directivity of your antenna maybe a smallish amplifier. There is much > discussion right now in the PNT (Position, Navigation and Timing) community > as to how best to secure the GNSS network, but right now one should > consider the data from GPS to be no more trustworthy than some random NTP > server on the internet. > >>> > >>> In order to build a resilient NTP server infrastructure you need > multiple sources of time distributed by multiple methods - typically both > via satellite (GPS) and by terrestrial (NTP) methods. NTP does a pretty > good job of sorting out multiple time servers and discarding sources that > are lying. But to do this you need multiple time sources. A common > recommendation is to run a couple/few NTP servers which only get time from > a GPS receiver and only serve time to a second tier of servers that pull > from both those in-house GPS-timed-NTP servers and other trusted NTP > servers. I'd recommend selecting the time servers to gain geographic > diversity, i.e. poll NIST servers in Maryland and Colorado, and possibly > both. > >>> > >>> Note that NIST will exchange (via mail) a set of keys with you to talk > encrypted NTP with you. See > https://www.nist.gov/pml/time-and-frequency-division/time-services/nist-authenticated-ntp-service > . > >>> > >>> > >>> > >>> On Sun, Aug 6, 2023 at 8:36?PM Mel Beckman <m...@beckman.org<mailto: > m...@beckman.org>> wrote: > >>> GPS Selective Availability did not disrupt the timing chain of GPS, > only the ephemeris (position information). But a government-disrupted > timebase scenario has never occurred, while hackers are a documented threat. > >>> > >>> DNS has DNSSec, which while not deployed as broadly as we might like, > at least lets us know which servers we can trust. > >>> > >>> Your own atomic clocks still have to be synced to a common standard to > be useful. To what are they sync'd? GPS, I'll wager. > >>> > >>> I sense hand-waving :) > >>> > >>> -mel via cell > >>> > >>> On Aug 6, 2023, at 7:04 PM, Rubens Kuhl <rube...@gmail.com<mailto: > rube...@gmail.com>> wrote: > >>> > >>> ? > >>> > >>> > >>> On Sun, Aug 6, 2023 at 8:20?PM Mel Beckman <m...@beckman.org<mailto: > m...@beckman.org>> wrote: > >>> Or one can read recent research papers that thoroughly document the > incredible fragility of the existing NTP hierarchy and soberly consider > their recommendations for remediation: > >>> > >>> The paper suggests the compromise of critical infrastructure. So, > besides not using NTP, why not stop using DNS ? Just populate a hosts file > with all you need. > >>> > >>> BTW, the stratum-0 source you suggested is known to have been > manipulated in the past (https://www.gps.gov/systems/gps/modernization/sa/), > so you need to bet on that specific state actor not returning to old habits. > >>> > >>> OTOH, 4 of the 5 servers I suggested have their own atomic clock, and > you can keep using GPS as well. If GPS goes bananas on timing, that source > will just be disregarded (one of the features of the NTP architecture that > has been pointed out over and over in this thread and you keep ignoring it). > >>> > >>> Rubens > >> > >