Re: [Ntp] Antw: Re: Antw: draft-ietf-ntp-mode-6-cmds : Issue 1

Harlan Stenn <stenn@nwtime.org> Thu, 14 December 2017 21:48 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F21BC128D44 for <ntp@ietfa.amsl.com>; Thu, 14 Dec 2017 13:48:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kgIJ4W9Won2x for <ntp@ietfa.amsl.com>; Thu, 14 Dec 2017 13:48:32 -0800 (PST)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 673741243F3 for <ntp@ietf.org>; Thu, 14 Dec 2017 13:48:32 -0800 (PST)
Received: from [10.66.254.3] (96-41-166-181.dhcp.mdfd.or.charter.com [96.41.166.181]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id D8E84B86C; Thu, 14 Dec 2017 21:48:31 +0000 (UTC)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (1.0)
From: Harlan Stenn <stenn@nwtime.org>
X-Mailer: iPhone Mail (15B202)
In-Reply-To: <b819ec71-5b90-7ef0-cf43-a0eb57ab0d26@innovationslab.net>
Date: Thu, 14 Dec 2017 13:48:27 -0800
Cc: ntp@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <2F1C07D9-E46B-413D-9B4F-75D27D53EA6F@nwtime.org>
References: <d5a5ba98-65f2-f2e0-a0ec-40114213fc03@innovationslab.net> <59C0BEBB020000A100027F1A@gwsmtp1.uni-regensburg.de> <90ca0015-6ff4-9f68-20c9-a978fea6f491@innovationslab.net> <fd938fee-ed5c-a0ca-148f-a20a8c72aaa5@nwtime.org> <59C4A769020000A100028053@gwsmtp1.uni-regensburg.de> <579cec94-f2ab-ce73-13f6-483f5c528da7@nwtime.org> <59C4B636020000A100028076@gwsmtp1.uni-regensburg.de> <62ae5e81-593f-e26a-8829-bc5f4be07dab@nwtime.org> <b819ec71-5b90-7ef0-cf43-a0eb57ab0d26@innovationslab.net>
To: Brian Haberman <brian@innovationslab.net>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/6spZukBtndEMGhVYaaClOzlzMaE>
Subject: Re: [Ntp] Antw: Re: Antw: draft-ietf-ntp-mode-6-cmds : Issue 1
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Dec 2017 21:48:34 -0000

Partial answer: we know the gross version the client wants because it’s in the base packet. 

We’re about to have some interesting discussions.

And I bet they’ll be very similar to the ones we should be having about the Yang Data model, and a reexamination of the NTP SNMP spec. 

Sent from my iPhone. Please excuse brevity and typos.

> On Dec 14, 2017, at 8:45 AM, Brian Haberman <brian@innovationslab.net> wrote:
> 
> Reviving this thread because we never reached any consensus on what
> things we want in the mode-6-cmds draft...
> 
>> On 9/22/17 3:47 AM, Harlan Stenn wrote:
>> 
>> 
>> On 9/22/2017 12:05 AM, Ulrich Windl wrote:
>>>>>> Harlan Stenn <stenn@nwtime.org> schrieb am 22.09.2017 um 08:26 in Nachricht
>>> <579cec94-f2ab-ce73-13f6-483f5c528da7@nwtime.org>:
>>> 
>>>> On 9/21/17 11:02 PM, Ulrich Windl wrote:
>>>>>>>> Harlan Stenn <stenn@nwtime.org> schrieb am 21.09.2017 um 00:42 in Nachricht
>>>>> <fd938fee-ed5c-a0ca-148f-a20a8c72aaa5@nwtime.org>:
>>>>> 
>>>>>> 
>>>>>>> On 9/20/17 12:10 PM, Brian Haberman wrote:
>>>>>>> 
>>>>>>> 
>>>>>>> On 9/19/17 2:52 AM, Ulrich Windl wrote:
>>>>>>>>>>> Brian Haberman <brian@innovationslab.net> schrieb am 18.09.2017 um 19:10 in
>>>>>>>> Nachricht <d5a5ba98-65f2-f2e0-a0ec-40114213fc03@innovationslab.net>:
>>>>>>>>> Ulrich noted that this document does not specify a version number for
>>>>>>>>> the mode 6 commands. I had suggested specifying it as "version 4 (or
>>>>>>>>> earlier)" given that the introduction of mode 6 commands has occurred at
>>>>>>>>> various versions of the protocol starting at RFC 1305. Ulrich pointed
>>>>>>>>> out that the version number drives the interpretation of the status words.
>>>>>>>>> 
>>>>>>>>> For people who have implemented or use mode 6 commands, what makes sense
>>>>>>>>> here? Do we need to specify a version number per mode 6 command?
>>>>>>>> 
>>>>>>>> Hi!
>>>>>>>> 
>>>>>>>> I think there are several issues:
>>>>>>>> 
>>>>>>>> 1) Assuming there are different versions (there are!), how can one find out 
>>>>>> which version the server implements? See 2)
>>>>>>>> 
>>>>>>>> 2) if a client requests a version different from the server, what should the 
>>>> 
>>>>>> server do? The server could respond with a different version number, 
>>>>>> indicating that it is not willing to respond / privide the information in 
>>>> the 
>>>>>> format requested. Or the server could respond with a "bad request" status. 
>>>>>> Finally the server could respond in the format requested... I have slight 
>>>>>> favor for the first variant unless there is a command to find out what 
>>>>>> message format versions the server can provide.
>>>>>>>> 
>>>>>>>> 3) As it seems to be now, the server ignores the version (versions 2, 3, and 
>>>> 
>>>>>> 4 all seem to work)
>>>>>>>> 
>>>>>>> 
>>>>>>> The above seems to argue for two things:
>>>>>>> 
>>>>>>> 1) A preliminary handshake between an NTP server and the mode6-speaking
>>>>>>> client to determine what version is in use.
>>>>>>> 
>>>>>>> 2) A change to the operating basis of the mode 6 commands in that the
>>>>>>> above mentioned handshake occurs before actually sending the mode 6 command.
>>>>>>> 
>>>>>>> Is that a good representation of what is being asked for?
>>>>>> 
>>>>>> If it is, I'm thinking we'd want a mode 6 "Identify" command, that would
>>>>>> have this information in a response.  This response would likely contain
>>>>>> different data before/after authentication.
>>>>> 
>>>>> Why that? You should elaborate on the role of authentication.
>>>> 
>>>> Here's a short list.
>>>> 
>>>> - Nobody but trusted folks should see the origin timestamp of a pending
>>>>  symmetric mode exchange.
>>>> 
>>>> - Nobody but trusted folks should be able to get the list of our
>>>>  potential servers.
>>>> 
>>>> - Nobody but VERY trusted folks should be able to issue :config
>>>>  directives
>>> 
>>> Hi Harlan,
>>> 
>>> even more confused now: The issue was (unless I'm confused) to finde out what mode-6 protocol version the remote side (server) speaks.
>>> You talk about changing the requirements of existing commands (it seems).
>>> I have no objection changing the require ments on the next mode-6 protocol level, but these issues should be clearly separated IMHO.
>> 
>> I thought the intent was to make sure that ntpq could ask an NTP server
>> "what can you tell me about yourself?", in enough detail that the client
>> will then know what to ask, and how to interpret the results.
> 
> I can interpret this capability in two ways:
> 
> 1. ntpq tells the server what version it is going to ask its questions
> for. This is based on Ulrich's example code showing that different
> variables exist in different versions. The response back from the server
> would be a binary (Y/N) on its ability to answer questions for that version.
> 
> 2. ntpq asks the server which version(s) it supports. When the server
> responds with a version number, ntpq figures out whether it can handle
> questions for that version.
> 
> I interpret Harlan's response as an indication that he thinks option 2
> is the way to go. If that is the case, it would seem that we would want
> to add a new command to the draft that asks the server to indicate its
> version of NTP.
> 
> Other thoughts?
> 
> Regards,
> Brian
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org
> https://www.ietf.org/mailman/listinfo/ntp
>