Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Harlan Stenn <stenn@nwtime.org> Thu, 11 August 2022 12:00 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90973C14F72F for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 05:00:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.105
X-Spam-Level:
X-Spam-Status: No, score=-6.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q3DU8uyLeSEp for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 05:00:43 -0700 (PDT)
Received: from chessie.everett.org (unknown [IPv6:2001:470:1:205::234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B5B8C14F6E7 for <ntp@ietf.org>; Thu, 11 Aug 2022 05:00:43 -0700 (PDT)
Received: from [10.208.75.149] (071-084-168-128.res.spectrum.com [71.84.168.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M3QP660KlzMP49; Thu, 11 Aug 2022 12:00:42 +0000 (UTC)
Message-ID: <d9563ba1-be2f-3619-cd4f-19ee30206ce2@nwtime.org>
Date: Thu, 11 Aug 2022 05:00:42 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: Martin Burnicki <martin.burnicki=40meinberg.de@dmarc.ietf.org>, "ntp@ietf.org" <ntp@ietf.org>, Hal Murray <halmurray@sonic.net>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <7eef9a6f-a115-b009-24e5-2b96a8bc02ae@meinberg.de> <YvI4qRV+MOrmYKey@localhost> <de5650d1-bf3a-34bf-9812-acb942364f4f@nwtime.org> <YvTghH4nLX2I0SVV@localhost>
From: Harlan Stenn <stenn@nwtime.org>
In-Reply-To: <YvTghH4nLX2I0SVV@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/8N4i1ONBCv7hudsre64PtYvylCA>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2022 12:00:48 -0000

On 8/11/2022 3:57 AM, Miroslav Lichvar wrote:
> On Thu, Aug 11, 2022 at 03:16:05AM -0700, Harlan Stenn wrote:
>> On 8/9/2022 3:36 AM, Miroslav Lichvar wrote:
>>> The proposed NTPv5 header is not compatible with NTPv4. Servers can
>>> support multiple versions. If they support NTPv5, they should respond
>>> with NTPv5. If they don't support NTPv5, they shouldn't respond with
>>> anything.
>>
>> We disagree.  That's not a problem.  What's wrong with that choice being a
>> local policy choice on the part of either the implementation or the
>> responding system?
> 
> You don't see a problem with sending messages marked as being in one
> version, but conforming to another version?
> 
> All servers that currently respond to NTPv5 requests are broken. There
> is no NTPv5 specified yet. Unfortunately there is a large number of
> them, so we need to make sure NTPv5 clients will not accept these
> responses.

That is true if the design rules we've been following for decades are 
changed.

It is not true if the design rules are followed.

>>> There should be no ambiguity with extension fields. NTPv5 is expected
>>> to be compatible with NTPv4 extension fields. The main use case will
>>> be NTS. Autokey is insecure and should not be used.
>>
>> I don't understand.  Are you saying that if a v4 client sends an NTS packet
>> to a v5 server and that packet "passes the checks" then the v5 server should
>> respond with a v4 response?
> 
> If the v5 server supports v4, then yes. If it supports v5 only, it
> should not respond.

How do I reconcile what you just said in the previous line with what you 
said in the preceding quoted section?

>> I think that's what you're saying, and in that
>> case the issue of compatibility is moot - the v5 server is not responding
>> with v5 EFs.
> 
> The compatibility I mentioned makes it easier for existing NTS
> implementations to support NTPv5 in addition to NTPv4. I don't expect
> there to be any NTPv5-exclusive implementations, at least in near
> future.

What you are describing is still not clear to me.  That's OK with me.

-- 
Harlan Stenn <stenn@nwtime.org>
http://networktimefoundation.org - be a member!