For things like this always do a debug.

UDP is one way but the client has to inform the NTP server that it wants to
receive time from the server as it is done by default using unicast packets
not broadcast/multicast.  The client will request Time sending his password
to hash the request.  It will expect to receive the response back with the
server hashing the response with the same password.  If the server doesn't
respond in kind you will get an error in the debug "CRYPTO-NAK".

If the client is not configured for authentication and the server is, the
server will not hash the traffic to the client.  The client must make the
request first with the password for the server to answer back with the
password.  At least this is the case with 12.4(24)T4.

With NTP peer be aware that both peers must have a valid NTP source before
they will form a peer relationship with each other.  Each must first be
configured with a valid NTP server.

Take the password off the server and you will see an error about invalid
authentication.

R1(config)#
.Jan 21 15:34:23.904: NTP message sent to 4.4.4.4, from interface
'FastEthernet0/0' (192.1.14.1):
.Jan 21 15:34:23.904: NTP recv pkt on v4 socket, pak = 0x48C4A86C.
.Jan 21 15:34:23.904: NTP message received from 4.4.4.4 on interface
'FastEthernet0/0' (192.1.14.1):
.Jan 21 15:34:23.904: NTP Core(DEBUG): ntp_receive: message received
.Jan 21 15:34:23.904: NTP Core(DEBUG): ntp_receive: peer is 0x473D1B58, next
action is 1.
.Jan 21 15:34:23.904: NTP Core(NOTICE): ntp_receive: dropping message:
crypto-NAK.
R1(config)#
Regards,
 
Tyson Scott - CCIE #13513 R&S, Security, and SP
Managing Partner / Sr. Instructor - IPexpert, Inc.
Mailto: tsc...@ipexpert.com
Telephone: +1.810.326.1444, ext. 208
Live Assistance, Please visit: www.ipexpert.com/chat
eFax: +1.810.454.0130

IPexpert is a premier provider of Self-Study Workbooks, Video on Demand,
Audio Tools, Online Hardware Rental and Classroom Training for the Cisco
CCIE (R&S, Voice, Security & Service Provider) certification(s) with
training locations throughout the United States, Europe, South Asia and
Australia. Be sure to visit our online communities at
www.ipexpert.com/communities and our public website at www.ipexpert.com


-----Original Message-----
From: ccie_rs-boun...@onlinestudylist.com
[mailto:ccie_rs-boun...@onlinestudylist.com] On Behalf Of Bojan Zivancevic
Sent: Friday, January 21, 2011 12:57 AM
To: Matt Hill
Cc: ccie_rs@onlinestudylist.com
Subject: Re: [OSL | CCIE_RS] NTP mutual authentication - is it possible?

Yes you are right, but the idea could be that you have two conversations
actually, where every device will authenticate the other one.

That is why I mentioned NTP peer command. There is a "key" parameter there,
that is the first thing. Also, there is no "server" because they can sync
each other's clocks. Maybe this is a way to do mutual authentication? I
could not find any detailed info on this "ntp peer key" command.

Best Regards,

Bojan Zivancevic
Network Engineer

From: Matt Hill [mailto:mayd...@gmail.com]
Sent: Thursday, January 20, 2011 23:30
To: Bojan Zivancevic
Cc: ccie_rs@onlinestudylist.com
Subject: Re: [OSL | CCIE_RS] NTP mutual authentication - is it possible?

I might throw this one in the air...

NTP is UDP and completely unidirectional.  There are no ACKs or anything
like that.  The protocol itself has no mechanism for two way comms so I
would suggest that is why we cant so mutual authentication here.

If someone else has something to add here (even if it proves me wrong) I'm
happy to hear it.

Cheers,
Matt

CCIE #22386
CCSI #31207
On 20 January 2011 21:59, Bojan Zivancevic
<bzivance...@comutel.co.rs<mailto:bzivance...@comutel.co.rs>> wrote:
I have been searching for the "final' answer to this question but still
could not find it. Cisco doc is of no use, so it seems. Looked on the
internet also, but I am not convinced what can be done about it. If someone
could clear this up it will be a blast.

So, for many years NTP authentication was one-way. Only client had to
authenticate the source i.e. only the device that gets its clock changed has
to make sure that the source is valid. Makes sense. But since 12.4T Cisco
made some changes and now if we are doing authentication we must make
configs symmetrical. We could have done it before as well, but it was not
mandatory.

But I could not quite get if that is real mutual authentication or not. I
looked up on the CLI etc. But it just does not click to me. I would like
your opinion.

And what about NTP peer authentication? Is that mutual auth? There is no
real explanation about this command on Cisco doc as well.

Best Regards,

Bojan Zivancevic
Network Engineer
----
_______________________________________________
For more information regarding industry leading CCIE Lab training, please
visit www.ipexpert.com<http://www.ipexpert.com>

_______________________________________________
For more information regarding industry leading CCIE Lab training, please
visit www.ipexpert.com

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to