Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft-ietf-ntp-update-registries

Miroslav Lichvar <mlichvar@redhat.com> Wed, 17 August 2022 08:45 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA5AEC14CF17 for <ntp@ietfa.amsl.com>; Wed, 17 Aug 2022 01:45:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.679
X-Spam-Level:
X-Spam-Status: No, score=-2.679 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.571, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6y3eUDoqaU10 for <ntp@ietfa.amsl.com>; Wed, 17 Aug 2022 01:45:31 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 277E4C14F746 for <ntp@ietf.org>; Wed, 17 Aug 2022 01:45:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660725929; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=UJ70AvaTonNvjEHza1rSo1ywHNg/Dfz4VjJ0XKG35UQ=; b=Fqua9eDhMzXPqhT8CocXRPP/oxkJtUfx8pcvUCO0QspOvyhA+9p3f0+omJ0s3pyxb0CM9f APOdVR/WJdVGZS8nzBRFQNdPzcce06pD6a3YfjaMtAtjeRFOPNC3konimZwK00rd1X+RYV buK2iqESpN1YWBVveMObTYmDYLFgt7Q=
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-586-5HFgDcs7MimyEXFl9O_z7g-1; Wed, 17 Aug 2022 04:45:26 -0400
X-MC-Unique: 5HFgDcs7MimyEXFl9O_z7g-1
Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.rdu2.redhat.com [10.11.54.1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 259C2811E81; Wed, 17 Aug 2022 08:45:24 +0000 (UTC)
Received: from localhost (unknown [10.43.135.229]) by smtp.corp.redhat.com (Postfix) with ESMTPS id EFEEA40CFD0D; Wed, 17 Aug 2022 08:45:20 +0000 (UTC)
Date: Wed, 17 Aug 2022 10:45:19 +0200
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Harlan Stenn <stenn@nwtime.org>
Cc: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>, "ntp@ietf.org" <ntp@ietf.org>, Heiko Gerstung <heiko.gerstung@meinberg.de>
Message-ID: <YvyqnxraeuxbGqNs@localhost>
References: <F74A7B5B-3D77-42AF-BD7E-1A874CCD2D66@akamai.com> <67545c9a-3291-bbe6-c876-4c762c80c710@nwtime.org> <FF22AEFE-ED61-405E-AB40-B7901D0CD588@meinberg.de> <f79cecd6-92b0-595b-e449-6b6f8944ae66@nwtime.org> <133C5633-E4D5-42AF-8215-E3FDE28C5BF9@meinberg.de> <4f833218-231f-8c47-e529-b3ba00f6554e@nwtime.org> <62FB5EDB020000A10004C5CD@gwsmtp.uni-regensburg.de> <a89aeba9-5e88-2214-634f-7a9a7106eec3@nwtime.org> <Yvt4C97N+I51c54v@localhost> <d4ff7203-1c7a-2c9b-ab27-5c5143253b7e@nwtime.org>
MIME-Version: 1.0
In-Reply-To: <d4ff7203-1c7a-2c9b-ab27-5c5143253b7e@nwtime.org>
X-Scanned-By: MIMEDefang 2.84 on 10.11.54.1
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/AapwrZP2gumb3WDMcCEt2uVxm3k>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft-ietf-ntp-update-registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 17 Aug 2022 08:45:32 -0000

On Tue, Aug 16, 2022 at 04:44:31AM -0700, Harlan Stenn wrote:
> On 8/16/2022 3:57 AM, Miroslav Lichvar wrote:
> > I'd expect most people to assume that the version field indicates the
> > protocol version, same as for the timing modes.
> 
> OK, and the significant bit there is "I'd expect".
> 
> And "protocol version" - exactly what does that mean?

The network protocol which the server and client need to support in
order to correctly exchange data.

> what is the benefit of bumping the packet version in mode 6 (and probably
> mode 7) packets?

If there are no changes in the protocol, then it doesn't make sense to
increase the version number. This would be a good reason for keeping
the mode-6 specification separate from the rest.

> An argument can be made that if backward incompatible changes are made to
> the mode 6 "protocol" (and I use that term loosely) then at that point it
> makes sense to bump the version number in the header.

Yes, exactly. And I expect the same for the timing NTP modes.

> > I like how it explicitly says that servers are not supposed to respond
> > to unsupported versions.
> 
> So the reference implementation seems to clearly implement this.

Yes and I find it interesting that it can do that for mode 6 and 7, but
not the other modes.

> What are the pros/cons of responding (or not) to an unknown version?  I
> would think this would be something to consider when there is an actual
> use-case.

Responding to an unknown version leads to problems when the new
version is not compatible. You seem to agree that protocol versions
should change only on incompatible changes.

If the version can change for other reasons and the unknown version
turns out to be compatible, then responding to the unknown version
avoids the need to update the code. That's the only advantage I see.

> > Are there any client implementations using the NTPv4 control mode?
> 
> Do you mean ntpsnmpd?  Something else?

ntpsnmpd seems to be reusing the ntpq code, i.e. it uses NTPv2.

-- 
Miroslav Lichvar