Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-checksum-trailer-01.txt (Was: WGLC on draft-mizrahi-ntp-checksum-trailer-02.txt)

Danny Mayer <mayer@ntp.org> Thu, 02 July 2015 21:12 UTC

Return-Path: <ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org>
X-Original-To: ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com
Delivered-To: ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A02D91A1ABF for <ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com>; Thu, 2 Jul 2015 14:12:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level:
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=unavailable
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8e2MM59JCjA6 for <ietfarch-ntp-archives-ahFae6za@ietfa.amsl.com>; Thu, 2 Jul 2015 14:12:29 -0700 (PDT)
Received: from lists.ntp.org (lists.ntp.org [149.20.68.7]) by ietfa.amsl.com (Postfix) with ESMTP id F0A161A1AAE for <ntp-archives-ahFae6za@lists.ietf.org>; Thu, 2 Jul 2015 14:12:28 -0700 (PDT)
Received: from lists.ntp.org (lists.ntp.org [149.20.68.7]) by lists.ntp.org (Postfix) with ESMTP id E5E6586DB22 for <ntp-archives-ahFae6za@lists.ietf.org>; Thu, 2 Jul 2015 21:12:28 +0000 (UTC)
X-Original-To: ntpwg@lists.ntp.org
Delivered-To: ntpwg@lists.ntp.org
Received: from mail1.ntp.org (mail1.ntp.org [IPv6:2001:4f8:fff7:1::5]) by lists.ntp.org (Postfix) with ESMTP id ED3A486D48C for <ntpwg@lists.ntp.org>; Thu, 2 Jul 2015 21:03:00 +0000 (UTC)
Received: from [198.22.153.36] (helo=[10.2.64.166]) by mail1.ntp.org with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.77 (FreeBSD)) (envelope-from <mayer@ntp.org>) id 1ZAldH-000M9N-Oc; Thu, 02 Jul 2015 21:02:57 +0000
Message-ID: <5595A76E.8020805@ntp.org>
Date: Thu, 02 Jul 2015 17:04:46 -0400
From: Danny Mayer <mayer@ntp.org>
Organization: NTP
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:31.0) Gecko/20100101 Thunderbird/31.7.0
MIME-Version: 1.0
To: "Anil Kumar S N (VRP Network BL)" <anil.sn@huawei.com>, Anil Kumar <anil.ietf@gmail.com>, Tal Mizrahi <talmi@marvell.com>, Karen O'Donoghue <odonoghue@isoc.org>, "ntpwg@lists.ntp.org" <ntpwg@lists.ntp.org>, "tictoc@ietf.org" <tictoc@ietf.org>
References: <a55c427404b444bf93d4f9bff62f513f@IL-EXCH01.marvell.com> <5592D18A.7030901@ntp.org> <CAC38=VGf0EmcvGAaJ6X-goq-H0jFNhiNMvx40c0H4mJaotvQCQ@mail.gmail.com> <55935AA1.6050108@ntp.org> <327562D94EA7BF428CD805F338C31EF06B5AEB6D@nkgeml512-mbx.china.huawei.com> <55940737.8010904@ntp.org> <327562D94EA7BF428CD805F338C31EF06B5B0D70@nkgeml512-mbx.china.huawei.com>
In-Reply-To: <327562D94EA7BF428CD805F338C31EF06B5B0D70@nkgeml512-mbx.china.huawei.com>
X-SA-Exim-Connect-IP: 198.22.153.36
X-SA-Exim-Rcpt-To: tictoc@ietf.org, ntpwg@lists.ntp.org, odonoghue@isoc.org, talmi@marvell.com, anil.ietf@gmail.com, anil.sn@huawei.com
X-SA-Exim-Mail-From: mayer@ntp.org
X-SA-Exim-Version: 4.2
X-SA-Exim-Scanned: Yes (on mail1.ntp.org)
Subject: Re: [ntpwg] [TICTOC] WGLC on draft-ietf-ntp-checksum-trailer-01.txt (Was: WGLC on draft-mizrahi-ntp-checksum-trailer-02.txt)
X-BeenThere: ntpwg@lists.ntp.org
X-Mailman-Version: 2.1.20
Precedence: list
List-Id: IETF Working Group for Network Time Protocol <ntpwg.lists.ntp.org>
List-Unsubscribe: <http://lists.ntp.org/options/ntpwg>, <mailto:ntpwg-request@lists.ntp.org?subject=unsubscribe>
List-Archive: <http://lists.ntp.org/pipermail/ntpwg/>
List-Post: <mailto:ntpwg@lists.ntp.org>
List-Help: <mailto:ntpwg-request@lists.ntp.org?subject=help>
List-Subscribe: <http://lists.ntp.org/listinfo/ntpwg>, <mailto:ntpwg-request@lists.ntp.org?subject=subscribe>
Reply-To: mayer@ntp.org
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org
Sender: ntpwg <ntpwg-bounces+ntp-archives-ahfae6za=lists.ietf.org@lists.ntp.org>

On 7/2/2015 12:01 AM, Anil Kumar S N (VRP Network BL) wrote:
>> On 6/30/2015 11:57 PM, Anil Kumar S N (VRP Network BL) wrote:
>>> I believe RFC is not specific to ntpd, sntp, ntpdate, ntimed, Windows
>> Time, chrony etc...
>>> All above has to follow RFC, So if conformance is with RFC is
>> ultimate reasoning.
>>>
>>
>> I know that but you cannot be sure you won't break things if you don't
>> check the most widely used implementations of NTP.
> 
>  [Anil >>] I have posted a mail with analysis for backward compatibility 
> Let me know if you find any issues with respect to backward compatibility
> 

The analysis needs to be in its own thread and has nothing to do with
the checksum trailer draft.

>>
>>> I will publish detailed analysis on behavior NTPv3/NTPv4 with respect
>> to M-Bit.
>>> The problem is that while designing extension addition padding issue
>>> should have been taken care, We are trying to solve it. This is an
>> honest attempt.
>>>
>>
>> You cannot solve it in NTPv4 because you cannot signal this change in
>> any way to any NTPv4 system that don't know about it. While I agree
>> that
>> we should relax the requirements on the length of the extension field,
>> servers that don't know about this change will drop the packet because
>> it doesn't conform to the existing requirements for extension field
>> sizes.
>>
> [Anil >>]  Servers understand only Autokey now as per IANA, So Autokey 
> is untouched, For any new extension if they follow M-bit then there is 
> no issues and if server dosent understand new extension anyways server
> is gonna drop packet irrespective of M-Bit
> 

You mean that IANA is the only place you should look?

>>> I discussed with our network solution team, in real network most of
>> devices use only NTPv3 and
>>> they are not even willing to move into NTPv4 as NTPv3 is serving
>> their purpose.
>>
>> That's always been true and going to a new version of NTP won't change
>> that. On the other hand vendors who don't moved to the newer versions
>> of
>> NTP won't get the benefit of all the changes, enhancements and bug
>> fixes
>> but then most network devices are only interested in setting their own
>> time and don't care if the time received contains unknown extra
>> information.
>>
> [Anil >>] I feel if we introduce new version, we must make sure 
> They move into NTPv5 not because of compulsion instead new features 
> Available. NTPv3 is so stable that it has proved its correctness from 
> Years. People are happy with NTPv3.
> 

I believe that Dave Mills has a paper somewhere about the problems with
v3 and why he went to v4.

>>> Moving into New version is not the only solution to all the issues.
>>> We need some improvements in current NTPv4 too.
>>>
>>
>> The problem is that you lose a lot of servers if the extension field
>> does not comply with existing standards. They will drop the packet.
>>
> [Anil >>] Server will never initiate NTP messages, So there should be 
> A way that client and server negotiate what they support. This is tricky 
> because backward compatibility has to be supported.
> 

All servers are also clients so that argument doesn't hold water.

>>> Server receives burst of client
>>> requests. One of the requirements came for solution team is to find
>> as many servers as possible
>>> dynamically (with out multicast) and narrow down to stable servers.
>> Administrator should be able
>>> select one of the best server.
>>
>> The problem with that idea is that the Adminstrator rarely knows enough
>> to choose the right server. The selection rules in NTP are complicated
>> and they would need to know a great deal about NTP to be able to choose
>> a server. But it gets worse. What's a good server at one instance of
>> time is a bad server the next. NTP is designed to select the best
>> server
>> at each point in time and use it and change it as conditions change. An
>> administrator is never going to be doing that. For most administrators,
>> it's set and forget and move on to the next task. NTP (at least the
>> reference implementation) is good at making those decisions for the
>> administrator.
>>
> 
> [Anil >>] 
> I agree administrator can't make this decision, but he can't feel handicapped. 
> I believe in NTP selection procedure, But the problem which I would to address 
> for them is by giving options. Somehow client should get to know all the NTP 
> servers available in the network which is cleared NTP selection process.
> These must be candidate for administrator. Here Administrator cant select 
> Just based on looking at IP address, He has to give some more information 
> About servers which will make him feel confidant on selecting one of the server.

The administrator already makes a decision by choosing a list of servers
in the configuration file or dynamically adding them if necessary. Most
admins do this went setting up a system but once they have chosen they
forget all about it and never come back. That's the reality.

> 
>>>
>>> Selecting server : histroy of stability, challenge is trustability &
>> current load.
>>>
>>
>> Which changes from moment to moment. past performance is not an
>> indicator of future performance. If you need trustability you should be
>> using autokey or similar technologies.
>>
> [Anil >>]  I don't think any major vendors even have autokey in their release till now.
> Huawei has autokey but not even one customer is using inspite of hundreds of thousands 
> Routers are running NTP. We should understand what difficulties they are facing and why 
> They don't want to use Autokey.
> 
> Success of new protocol lies in number of interested people to use it. 
> 
>>> So I feel we need to solve issue by issue. Lets not differintiate
>> small or big.
>>>
>>
>> It's the details that kill you.
> [Anil >>]  There are lot more complicated protocols in the network with 
> 100's of extensions. I am routing background, I know how complicated BGP and OSPF is.
> This is just adding a bit to field type. So that new extension are added and used with ease.
> 

I know and that's not JUST adding a bit. The amount of testing is
enormous in addition to everything else.

Danny

_______________________________________________
ntpwg mailing list
ntpwg@lists.ntp.org
http://lists.ntp.org/listinfo/ntpwg