Re: [Ntp] I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt

Ragnar Sundblad <ragge@netnod.se> Thu, 26 March 2020 10:50 UTC

Return-Path: <ragge@netnod.se>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C55943A0DB7 for <ntp@ietfa.amsl.com>; Thu, 26 Mar 2020 03:50:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=netnod-se.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FvWKdto3wojF for <ntp@ietfa.amsl.com>; Thu, 26 Mar 2020 03:50:01 -0700 (PDT)
Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [IPv6:2a00:1450:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3060C3A0C83 for <ntp@ietf.org>; Thu, 26 Mar 2020 03:50:00 -0700 (PDT)
Received: by mail-lf1-x12a.google.com with SMTP id c20so4424811lfb.0 for <ntp@ietf.org>; Thu, 26 Mar 2020 03:50:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netnod-se.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=UHlOCq8VhmPGJAVEl1HlN0aFj+TFM2g6DqpO6hcbvhM=; b=0gzGnTwbeClw3awVkQkzWilK3wJcSpBIS5ENf5ayehJ6FoX1OF5oHjymzelm27Wcq9 xXoPkB/LVG6Sbq/ulJ87vgVTGJV1RgVK0QYL0WQIGL91Nx82vbRTEKiyrcfSA+WTFLQ6 O/xa5L71CzaU/zXMt4lU46b9G+3KvLsBGEOZIULApMLGPxSVtiqrEfH064JcR7Ur31ix gT+vV3KsQRXNgJv2hQUZ7qVgIOwc4I7yEB/dAdX9HOgT0cm126PBdTq6to63Fa00XC51 nuGLKaQ2XVDJMX2yfCLRU5PDJKaIZ7PO1hWqTJfBjal9xVOPDq6GmtsGN2AOITD8l/kC /odQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=UHlOCq8VhmPGJAVEl1HlN0aFj+TFM2g6DqpO6hcbvhM=; b=ozLV/D0fxOUvp2oNr8MlFE6iEePNT6a32EG1c7QEswiz3foPNWHHUKeA8LyO7Fbw1D WZVO12ImRglEem4/HBi21UhBdIsQ1xXTh5hdaB9yExB66oJKHhDTia6YnHPq/PNRaE+g tAEJG26DK364O7rdOahFu3wQ67bibLHKmywUA11KcziGnTl9s0nbpTlSbroXYsHct8tf /rw+XLZnfTtaXoX+MXNJp6bGaP5PXwG7AP51skkOt309BbhD8hYnigrlWNHTS7FcZMSa vYV6YP2OH9y0hWYPBDut/3Er+QGKihhVLTPf/qvua3kZlXE2NQeqHq5hcp/f1Mj7Xwnc kvNg==
X-Gm-Message-State: ANhLgQ1ziSLYjt+dWjQ+Gj+4Lt6qH8W4IXUgOq1dP6unA9OnaqhYVO9k BQ1hCu2WRDIQ5Sy9oMcIe7nvpw==
X-Google-Smtp-Source: ADFU+vuij/T6iRIXWvu0Cfl7g1zHLUZNRWBUO7eIQRHBelETMeJMchbEvZFhHvwwI80j8vyAcozwbA==
X-Received: by 2002:ac2:41c9:: with SMTP id d9mr5310813lfi.41.1585219798976; Thu, 26 Mar 2020 03:49:58 -0700 (PDT)
Received: from [10.0.1.14] (h-122-211.A530.priv.bahnhof.se. [213.80.122.211]) by smtp.gmail.com with ESMTPSA id 9sm1334992ljf.0.2020.03.26.03.49.57 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 26 Mar 2020 03:49:58 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Ragnar Sundblad <ragge@netnod.se>
In-Reply-To: <20200326095602.GB9039@localhost>
Date: Thu, 26 Mar 2020 11:49:57 +0100
Cc: NTP WG <ntp@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <842BEA8F-35F7-41B7-8FEC-30515F88A60D@netnod.se>
References: <158507294813.11622.18159158243943940302@ietfa.amsl.com> <20200325115834.GC25803@localhost> <74B1B8F5-5762-4AB1-B3F2-D5AC2BC325C1@netnod.se> <20200325145956.GF25803@localhost> <400E7210-ABB7-48F7-B52D-A69A96968255@netnod.se> <20200326095602.GB9039@localhost>
To: Miroslav Lichvar <mlichvar@redhat.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/BjO5O-wyDvE8yO0q79OYgCMmrk8>
Subject: Re: [Ntp] I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Mar 2020 10:50:05 -0000


> On 26 Mar 2020, at 10:56, Miroslav Lichvar <mlichvar@redhat.com> wrote:
> 
> On Wed, Mar 25, 2020 at 04:42:10PM +0100, Ragnar Sundblad wrote:
>>> On 25 Mar 2020, at 15:59, Miroslav Lichvar <mlichvar@redhat.com> wrote:
>>> I don't think they are so different. There will be a slow stream of
>>> NTS-KE requests as clients are (re)started (not caching the
>>> key/cookies) and clients running out of cookies when too many requests
>>> are dropped (as is currently happening in some networks).
>> 
>> Ok, both are network traffic, we can agree on that.
>> 
>> And one could starve the other, and if they share resources, that
>> should be taken care of, I hope we can agree on that too.
> 
> Yes, I agree.
> 
> But it seems we don't agree on how long actually will be the NTS
> sessions. You seem to be saying that a short initial interval in the
> exponential backoff is ok (in the name of simplicity), because the NTS
> sessions will be so long that the average rate will be insignificant
> over those long periods. Is that correct?

Hmm, I don’t think so. Also, do you mean one KE negotiation is one session,
or from one KE negotiation to the next one, if the clients reboots runs out
of cookies is one session?

I did mean, that the initial 10 seconds will only be 10 seconds if the server
is up but will not accept the TCP connection, if for example the listener
has not started, or is so overloaded that the TCP connection queue is full
(and this will be very cheap for the server, handled by TCP).
If the server is not up or not reachable, TCP will retry for a while before
giving up. (This will of course not cost the server anything.)
If the server accepts the TCP connection but is overloaded and slow to
respond, the client will just wait for the request to be handled (and could,
likely should, timeout after a while). There is no extra cost for the
server for this, really.

> I don't think that will be the case. I think it will be similar to the
> current NTP traffic. Some people just don't like running "unnecessary"
> daemons and run an NTP client from cron in an ntpdate mode.

Maybe, I don’t know. I don’t think the timers will have a lot of impact
on this though, such a client should timeout pretty quickly anyway, right?
And more importantly - the timers shouldn’t come into play, since that
means that something is overloaded or broken.

> Computers
> are shut down or suspended frequently.

If they are suspended, there is no need to renegotiate.
(I reboot my machine only when there is a new kernel or other major
thing that requires it, it seems to me almost everyone else do too, my
colleagues, my parents, my kids, everybody I can think of.)
But the timer constants have no impact on this, normally things should
work and not be overloaded, and the timers should not come into play.

> Clients are switching between
> different servers of a pool.

Only when the ntp client is restarted, right (at least with the clients
of today).
But even if a client would change NTP server very often and load the
KE servers, that could not be fixed by changing those constant either.

> I think it will take only a small portion of NTS clients to be
> consistently failing in NTS-KE or NTS-NTP after the TLS handshake
> (e.g. due to a network issue, bug, or incompatibility) and overwhelm
> the server with their short retry intervals.

They should not fail with a working server, why would they?
And if they do, they will very quickly get to long retry intervals,
and there is likely something broken with the server anyway.

Ragnar