Re: [Ntp] Antw: [EXT] Re: CLOCK_TAI (was NTPv5: big picture)

Paul Gear <ntp@libertysys.com.au> Thu, 07 January 2021 09:44 UTC

Return-Path: <ntp@libertysys.com.au>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2D7E53A0DFA for <ntp@ietfa.amsl.com>; Thu, 7 Jan 2021 01:44:28 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.099
X-Spam-Level:
X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=libertysys.com.au
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 00Ui0JMGDpWq for <ntp@ietfa.amsl.com>; Thu, 7 Jan 2021 01:44:27 -0800 (PST)
Received: from mail.libertysys.com.au (2001-44b8-2100-3f00-0000-0000-0000-0019.static.ipv6.internode.on.net [IPv6:2001:44b8:2100:3f00::19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 09C743A0DF9 for <ntp@ietf.org>; Thu, 7 Jan 2021 01:44:27 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mail.libertysys.com.au (Postfix) with ESMTP id 911A31805F4 for <ntp@ietf.org>; Thu, 7 Jan 2021 19:44:24 +1000 (AEST)
X-Virus-Scanned: Debian amavisd-new at mail2.gear.dyndns.org
Received: from mail.libertysys.com.au ([127.0.0.1]) by localhost (mail.gear.dyndns.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id etVSmB-C3xET for <ntp@ietf.org>; Thu, 7 Jan 2021 19:44:19 +1000 (AEST)
Received: from [IPv6:2001:44b8:2100:3f40:98a3:b4a2:f254:6dd7] (unknown [IPv6:2001:44b8:2100:3f40:98a3:b4a2:f254:6dd7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (No client certificate requested) by mail.libertysys.com.au (Postfix) with ESMTPSA id 40EFF1801E0 for <ntp@ietf.org>; Thu, 7 Jan 2021 19:44:19 +1000 (AEST)
Authentication-Results: mail.libertysys.com.au; dmarc=fail (p=quarantine dis=none) header.from=libertysys.com.au
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=libertysys.com.au; s=2016; t=1610012659; bh=/Y1627lm4Y9XJBG6RVsKyk3O5avAJbGmRnppkodz1RY=; h=Subject:To:References:From:Date:In-Reply-To:From; b=jV1drO699BEY8jeg48D2/M3e55BEL/T8iZmryZmNbhVfynACW+26duPz2JeVvGFWg l+NIpTxngqetsW8DbYW8r3XzAmAej4YN9aSLcslJAfGiLVLv6AHsOcPPWJcmP4tVUV AOen/otwJzhy+My84wFqhrkd6PmL46RtLlPjgHXE=
To: ntp@ietf.org
References: <20210107091330.11BF0406060@ip-64-139-1-69.sjc.megapath.net>
From: Paul Gear <ntp@libertysys.com.au>
Message-ID: <01b39204-6e80-ee99-6c17-0d4e6e790326@libertysys.com.au>
Date: Thu, 07 Jan 2021 19:44:18 +1000
MIME-Version: 1.0
In-Reply-To: <20210107091330.11BF0406060@ip-64-139-1-69.sjc.megapath.net>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit
Content-Language: en-AU
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/0fobnnBJfzkeEyC5769sMhbw9kk>
Subject: Re: [Ntp] Antw: [EXT] Re: CLOCK_TAI (was NTPv5: big picture)
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2021 09:44:28 -0000

On 7/1/21 7:13 pm, Hal Murray wrote:
> Ulrich.Windl@rz.uni-regensburg.de said:
>> My initial feeling is that a NTPv5 server should respond to v3 and v4
>> requests. If networks really have v2 clients or older, they'd need some
>> "gateway" to translate the time. 
> Requests arriving at a pool server:
>     136711  0.221% NTPv1
>      10626  0.017% NTPv2
>   16845809 27.269% NTPv3
>   44782460 72.492% NTPv4
>          3  0.000% NTPv6 - length 48
>          1  0.000% NTPv6 - length 68


Interesting - I checked for other versions when I did my sample and
didn't see anything other than v 1-4.  Maybe if I had run it for a
couple of orders of magnitude longer... :-)

Paul