Re: [Ntp] CLOCK_TAI (was NTPv5: big picture)

Philip Prindeville <philipp@redfish-solutions.com> Thu, 07 January 2021 00:31 UTC

Return-Path: <philipp@redfish-solutions.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4674A3A1408 for <ntp@ietfa.amsl.com>; Wed, 6 Jan 2021 16:31:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ImxRgEFH1vrI for <ntp@ietfa.amsl.com>; Wed, 6 Jan 2021 16:31:17 -0800 (PST)
Received: from mail.redfish-solutions.com (mail.redfish-solutions.com [45.33.216.244]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ABFB63A1406 for <ntp@ietf.org>; Wed, 6 Jan 2021 16:31:16 -0800 (PST)
Received: from [192.168.3.4] ([192.168.3.4]) (authenticated bits=0) by mail.redfish-solutions.com (8.16.1/8.16.1) with ESMTPSA id 1070VFih361922 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 6 Jan 2021 17:31:15 -0700
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\))
From: Philip Prindeville <philipp@redfish-solutions.com>
In-Reply-To: <293d5561-a3ba-156c-b5f6-132fc3091fb0@meinberg.de>
Date: Wed, 06 Jan 2021 17:31:15 -0700
Cc: Hal Murray <hmurray@megapathdsl.net>, Miroslav Lichvar <mlichvar@redhat.com>, ntp@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <962BC9F3-4EA7-4A59-A598-D2F92C9DBB4D@redfish-solutions.com>
References: <20210105124544.5EF5C40605C@ip-64-139-1-69.sjc.megapath.net> <FAA34AF4-4559-4F0A-9D6F-52CD72F61817@redfish-solutions.com> <293d5561-a3ba-156c-b5f6-132fc3091fb0@meinberg.de>
To: Martin Burnicki <martin.burnicki@meinberg.de>
X-Mailer: Apple Mail (2.3654.40.0.2.32)
X-Scanned-By: MIMEDefang 2.84 on 192.168.1.3
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/1bVZKxBJMhujuc6IcpPvZQH2LIo>
Subject: Re: [Ntp] CLOCK_TAI (was NTPv5: big picture)
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Jan 2021 00:31:19 -0000


> On Jan 6, 2021, at 3:36 AM, Martin Burnicki <martin.burnicki@meinberg.de> wrote:
> 
> Philip Prindeville wrote:
>>> On Jan 5, 2021, at 5:45 AM, Hal Murray <hmurray@megapathdsl.net> wrote:
>>> 
>>> A copy of the leap seconds file is included by the Time Zone project and 
>>> distributed by IANA.  Most distros are already setup to keep the time zone 
>>> info up to date.  It should be simple for the leap file to go along for the 
>>> ride.  Debian already does it.
>> 
>> That seems like a good argument to NOT include it in the protocol, if it’s already available out-of-band.
> 
> If you force using TAI for NTP but don't include the relevant
> information in the NTP protocol, this means that you are generally
> unable to operate NTP properly unless you always take care and maintain
> the additional information.


That’s a non sequitur.  It can be a requirement of NTPv5 that the host environment includes a leaping database, daylight time calendars, etc. to put canonical time into both UTC and local time...


> In the past there was no such requirement, and I think it's a drawback
> if you add such a requirement now.


Like I said, it’s an effort to remove inherited encumbrances from NTP that never should have been there:  if we add any complexity at all, it should be to its core requirements (like security).

-Philip


> Martin