Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-checksum-trailer-01.txt (Was: WGLC on draft-mizrahi-ntp-checksum-trailer-02.txt)
Danny Mayer <mayer@ntp.org> Thu, 02 July 2015 21:12 UTC
Return-Path: <ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org>
X-Original-To: ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com
Delivered-To: ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A02D91A1ABF for <ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com>; Thu, 2 Jul 2015 14:12:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8e2MM59JCjA6 for <ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com>; Thu, 2 Jul 2015 14:12:29 -0700 (PDT)
Received: from lists.ntp.org (lists.ntp.org [149.20.68.7]) by ietfa.amsl.com (Postfix) with ESMTP id F0A161A1AAE for <ntp-archives-ahFae6za@lists.ietf.org>; Thu, 2 Jul 2015 14:12:28 -0700 (PDT)
Received: from lists.ntp.org (lists.ntp.org [149.20.68.7]) by lists.ntp.org (Postfix) with ESMTP id E5E6586DB22 for <ntp-archives-ahFae6za@lists.ietf.org>; Thu, 2 Jul 2015 21:12:28 +0000 (UTC)
X-Original-To: ntpwg@lists.ntp.org
Delivered-To: ntpwg@lists.ntp.org
Received: from mail1.ntp.org (mail1.ntp.org [IPv6:2001:4f8:fff7:1::5]) by lists.ntp.org (Postfix) with ESMTP id ED3A486D48C for <ntpwg@lists.ntp.org>; Thu, 2 Jul 2015 21:03:00 +0000 (UTC)
Received: from [198.22.153.36] (helo=[10.2.64.166]) by mail1.ntp.org with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.77 (FreeBSD)) (envelope-from <mayer@ntp.org>) id 1ZAldH-000M9N-Oc; Thu, 02 Jul 2015 21:02:57 +0000
Message-ID: <5595A76E.8020805@ntp.org>
Date: Thu, 02 Jul 2015 17:04:46 -0400
From: Danny Mayer <mayer@ntp.org>
Organization: NTP
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "Anil Kumar S N (VRP Network BL)" <anil.sn@huawei.com>, Anil Kumar <anil.ietf@gmail.com>, Tal Mizrahi <talmi@marvell.com>, Karen O'Donoghue <odonoghue@isoc.org>, "ntpwg@lists.ntp.org" <ntpwg@lists.ntp.org>, "tictoc@ietf.org" <tictoc@ietf.org>
References: <a55c427404b444bf93d4f9bff62f513f@IL-EXCH01.marvell.com> <5592D18A.7030901@ntp.org> <CAC38=VGf0EmcvGAaJ6X-goq-H0jFNhiNMvx40c0H4mJaotvQCQ@mail.gmail.com> <55935AA1.6050108@ntp.org> <327562D94EA7BF428CD805F338C31EF06B5AEB6D@nkgeml512-mbx.china.huawei.com> <55940737.8010904@ntp.org> <327562D94EA7BF428CD805F338C31EF06B5B0D70@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <327562D94EA7BF428CD805F338C31EF06B5B0D70@nkgeml512-mbx.china.huawei.com>
X-SA-Exim-Connect-IP: 198.22.153.36
X-SA-Exim-Rcpt-To: tictoc@ietf.org, ntpwg@lists.ntp.org, odonoghue@isoc.org, talmi@marvell.com, anil.ietf@gmail.com, anil.sn@huawei.com
X-SA-Exim-Mail-From: mayer@ntp.org
X-SA-Exim-Version: 4.2
X-SA-Exim-Scanned: Yes (on mail1.ntp.org)
Subject: Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-checksum-trailer-01.txt (Was: WGLC on draft-mizrahi-ntp-checksum-trailer-02.txt)
X-BeenThere: ntpwg@lists.ntp.org
X-Mailman-Version: 2.1.20
Precedence: list
List-Id: IETF Working Group for Network Time Protocol <ntpwg.lists.ntp.org>
List-Unsubscribe: <http://lists.ntp.org/options/ntpwg>, <mailto:ntpwg-request@lists.ntp.org?subject=unsubscribe>
List-Archive: <http://lists.ntp.org/pipermail/ntpwg/>
List-Post: <mailto:ntpwg@lists.ntp.org>
List-Help: <mailto:ntpwg-request@lists.ntp.org?subject=help>
List-Subscribe: <http://lists.ntp.org/listinfo/ntpwg>, <mailto:ntpwg-request@lists.ntp.org?subject=subscribe>
Reply-To: mayer@ntp.org
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org
Sender: ntpwg <ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org>
On 7/2/2015 12:01 AM, Anil Kumar S N (VRP Network BL) wrote: >> On 6/30/2015 11:57 PM, Anil Kumar S N (VRP Network BL) wrote: >>> I believe RFC is not specific to ntpd, sntp, ntpdate, ntimed, Windows >> Time, chrony etc... >>> All above has to follow RFC, So if conformance is with RFC is >> ultimate reasoning. >>> >> >> I know that but you cannot be sure you won't break things if you don't >> check the most widely used implementations of NTP. > > [Anil >>] I have posted a mail with analysis for backward compatibility > Let me know if you find any issues with respect to backward compatibility > The analysis needs to be in its own thread and has nothing to do with the checksum trailer draft. >> >>> I will publish detailed analysis on behavior NTPv3/NTPv4 with respect >> to M-Bit. >>> The problem is that while designing extension addition padding issue >>> should have been taken care, We are trying to solve it. This is an >> honest attempt. >>> >> >> You cannot solve it in NTPv4 because you cannot signal this change in >> any way to any NTPv4 system that don't know about it. While I agree >> that >> we should relax the requirements on the length of the extension field, >> servers that don't know about this change will drop the packet because >> it doesn't conform to the existing requirements for extension field >> sizes. >> > [Anil >>] Servers understand only Autokey now as per IANA, So Autokey > is untouched, For any new extension if they follow M-bit then there is > no issues and if server dosent understand new extension anyways server > is gonna drop packet irrespective of M-Bit > You mean that IANA is the only place you should look? >>> I discussed with our network solution team, in real network most of >> devices use only NTPv3 and >>> they are not even willing to move into NTPv4 as NTPv3 is serving >> their purpose. >> >> That's always been true and going to a new version of NTP won't change >> that. On the other hand vendors who don't moved to the newer versions >> of >> NTP won't get the benefit of all the changes, enhancements and bug >> fixes >> but then most network devices are only interested in setting their own >> time and don't care if the time received contains unknown extra >> information. >> > [Anil >>] I feel if we introduce new version, we must make sure > They move into NTPv5 not because of compulsion instead new features > Available. NTPv3 is so stable that it has proved its correctness from > Years. People are happy with NTPv3. > I believe that Dave Mills has a paper somewhere about the problems with v3 and why he went to v4. >>> Moving into New version is not the only solution to all the issues. >>> We need some improvements in current NTPv4 too. >>> >> >> The problem is that you lose a lot of servers if the extension field >> does not comply with existing standards. They will drop the packet. >> > [Anil >>] Server will never initiate NTP messages, So there should be > A way that client and server negotiate what they support. This is tricky > because backward compatibility has to be supported. > All servers are also clients so that argument doesn't hold water. >>> Server receives burst of client >>> requests. One of the requirements came for solution team is to find >> as many servers as possible >>> dynamically (with out multicast) and narrow down to stable servers. >> Administrator should be able >>> select one of the best server. >> >> The problem with that idea is that the Adminstrator rarely knows enough >> to choose the right server. The selection rules in NTP are complicated >> and they would need to know a great deal about NTP to be able to choose >> a server. But it gets worse. What's a good server at one instance of >> time is a bad server the next. NTP is designed to select the best >> server >> at each point in time and use it and change it as conditions change. An >> administrator is never going to be doing that. For most administrators, >> it's set and forget and move on to the next task. NTP (at least the >> reference implementation) is good at making those decisions for the >> administrator. >> > > [Anil >>] > I agree administrator can't make this decision, but he can't feel handicapped. > I believe in NTP selection procedure, But the problem which I would to address > for them is by giving options. Somehow client should get to know all the NTP > servers available in the network which is cleared NTP selection process. > These must be candidate for administrator. Here Administrator cant select > Just based on looking at IP address, He has to give some more information > About servers which will make him feel confidant on selecting one of the server. The administrator already makes a decision by choosing a list of servers in the configuration file or dynamically adding them if necessary. Most admins do this went setting up a system but once they have chosen they forget all about it and never come back. That's the reality. > >>> >>> Selecting server : histroy of stability, challenge is trustability & >> current load. >>> >> >> Which changes from moment to moment. past performance is not an >> indicator of future performance. If you need trustability you should be >> using autokey or similar technologies. >> > [Anil >>] I don't think any major vendors even have autokey in their release till now. > Huawei has autokey but not even one customer is using inspite of hundreds of thousands > Routers are running NTP. We should understand what difficulties they are facing and why > They don't want to use Autokey. > > Success of new protocol lies in number of interested people to use it. > >>> So I feel we need to solve issue by issue. Lets not differintiate >> small or big. >>> >> >> It's the details that kill you. > [Anil >>] There are lot more complicated protocols in the network with > 100's of extensions. I am routing background, I know how complicated BGP and OSPF is. > This is just adding a bit to field type. So that new extension are added and used with ease. > I know and that's not JUST adding a bit. The amount of testing is enormous in addition to everything else. Danny _______________________________________________ ntpwg mailing list ntpwg@lists.ntp.org http://lists.ntp.org/listinfo/ntpwg
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Tal Mizrahi
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar S N (VRP Network BL)
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Danny Mayer
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Danny Mayer
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar S N (VRP Network BL)
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar S N (VRP Network BL)
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Danny Mayer
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Danny Mayer
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar S N (VRP Network BL)
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Anil Kumar S N (VRP Network BL)
- Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-check… Danny Mayer