Re: [Ntp] NTPv5: big picture

Dieter Sibold <dsibold.ietf@gmail.com> Mon, 04 January 2021 17:31 UTC

Return-Path: <dsibold.ietf@gmail.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BA323A0EAC for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 09:31:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.197
X-Spam-Level:
X-Spam-Status: No, score=-0.197 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QrtE6wFTzAaT for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 09:31:34 -0800 (PST)
Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6267C3A0EA7 for <ntp@ietf.org>; Mon, 4 Jan 2021 09:31:34 -0800 (PST)
Received: by mail-ej1-x62f.google.com with SMTP id ga15so5708909ejb.4 for <ntp@ietf.org>; Mon, 04 Jan 2021 09:31:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=BBBxe975UDksO7U0cc4SjJGIXqgMCApOmGUNswhzdzY=; b=OztqrA7Jsuufige0F55irtMJDUrxIQ/JRRV9MhwP5IfdDKTThJzlbvWMdeawUYtgpt H8JXNa8VeEqh4AKVlXZtVRmLxPvGwjqBPfiBrpVcrp6xKnNI25dDQPJ1X5h+Gas90W2v 2iJiFcYhFtUub62Jc/8yBbJ0LDhMkDSq9bMgnNu9IPwlWtGElPvEEPbScuuHYqT0fKFm RXDPwGF/9ZqIDoToHiShOxa7vcodAw3n/c8FcirsQadRTLA27FqkPFLeXE6cS/Gevr1n dX8s8B5+obXWY0gl3k++sI4YwlqYdqtvH0u3xsB2GTOgkjYnEqYkvavxOEizR1hCK5fb QlzA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=BBBxe975UDksO7U0cc4SjJGIXqgMCApOmGUNswhzdzY=; b=ALzqwfsAf8TBvYYxqzzf7pwhLoqhMlO4Bov0raC6AJKuurerOcEv18H7WLFHjl24rl JdH+iCDnz11EJhPPZEApAEqdyacCJSX1Ajrjh0Fkhlze3F2HeQosFAPR+VV7PX0Q/StQ eBFmCNnfSmnlzmw6vgU5L2NiLDFUpOlnk2KtBlJApYvXPM1QvqNhNdway2oKWINJ3i2T OZfuUUgJsc2Nv9EwzgpS6iBtf7WLEAxh9yIIxU1IWaNYntlQHjkkRN/lU0H9vuhEId/O IcKT8kAgPKK1z8E22h+p+1NLu7+YOsjTfTa8v4zuYu+bAtHgacc83gZboTvlu+ODK2b+ 1EGQ==
X-Gm-Message-State: AOAM531BviWBzJXT5ahBl7Di7S/JpqPXozsuuSH2EtJXi4YmRuWX3NHo cISLPogq0QdyWdFjWAtqA4Y=
X-Google-Smtp-Source: ABdhPJx2ZlCbwanDL+544pu3r7FTvPDBNlc1hmuktOIs0FfVdT0STzaCw09gq0wxAJHSlZqOXlEh2A==
X-Received: by 2002:a17:907:96a4:: with SMTP id hd36mr65211228ejc.393.1609781492984; Mon, 04 Jan 2021 09:31:32 -0800 (PST)
Received: from [192.168.111.41] (p200300d17f1397000d89ab78b821188d.dip0.t-ipconnect.de. [2003:d1:7f13:9700:d89:ab78:b821:188d]) by smtp.gmail.com with ESMTPSA id mb22sm23778569ejb.35.2021.01.04.09.31.31 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 04 Jan 2021 09:31:32 -0800 (PST)
From: Dieter Sibold <dsibold.ietf@gmail.com>
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: Hal Murray <hmurray@megapathdsl.net>, NTP WG <ntp@ietf.org>
Date: Mon, 04 Jan 2021 18:31:31 +0100
X-Mailer: MailMate (1.13.2r5673)
Message-ID: <0D36B305-90EE-4FCD-A53E-8941388BBA97@gmail.com>
In-Reply-To: <20210104151813.GB2992437@localhost>
References: <20210101025440.ECE3340605C@ip-64-139-1-69.sjc.megapath.net> <20210104151813.GB2992437@localhost>
MIME-Version: 1.0
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/2ofyXH2X6N4OyG6bxQlnuMsvBBg>
Subject: Re: [Ntp] NTPv5: big picture
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jan 2021 17:31:36 -0000


On 4 Jan 2021, at 16:18, Miroslav Lichvar wrote:

> On Thu, Dec 31, 2020 at 06:54:40PM -0800, Hal Murray wrote:
>>
>> Do we have a unifying theme?  Can you describe why we are working on 
>> NTPv5 in
>> one sentence?
>
> There is a list of issues in NTPv4 I would like to see fixed in NTPv5:
> https://trac.ietf.org/trac/ntp/wiki/NtpVersionFourIssues
>
> A major issue is that NTPv4 doesn't support short extension fields due
> to conflicts with legacy MACs, so fixing all those issues by adding
> new extending fields to NTPv4 seems impractical. Some things, e.g. the
> timescale selection, makes more sense to have in the header.
>
>> Part of the motivation for this is to enable and encourage OSes to 
>> convert to
>> non-leaping time in the kernels.  Are there any subtle details in 
>> this area
>> that we should be aware of?  Who should we coordinate with?  ...
>
> I don't think that should be the job of the NTP WG. The kernels will
> need to support a leaping UTC timescale for as long as it is needed
> for civil time.
>
> NTP should keep support for the existing use cases. It is a protocol
> for exchanging timestamps. The client and server need to agree on the
> timescale. If both have support for TAI, that's great. They can use it
> to avoid ambiguous timestamps around leap seconds. But this shouldn't
> be a requirement. NTP needs to support UTC and it needs to announce
> leap seconds before they happen. Forcing some servers or clients to
> implement an unreliable TAI clock on top of an UTC clock only to make
> NTP slightly simpler is not a good idea.
>
>> ---------
>>
>> I think this would bring out another important area: How does a 
>> client
>> discover if a server supports an option and/or discover servers that 
>> do
>> support it?
>
> With most options I think the client can simply send a request using
> that option and see if the server's response has it. It can do that
> with every request, or try it only occasionally to reduce the average
> length of the request and response.
>
> For more complex or conflicting features, the support can be indicated
> with a flag in an extension field.

If security-by-default is enforced the NTS-KE could serve as a robust 
mean to exchange the server’s capabilities.




>
> -- 
> Miroslav Lichvar
>
> _______________________________________________
> ntp mailing list
> ntp@ietf.org
> https://www.ietf.org/mailman/listinfo/ntp