Re: [Ntp] Antw: Re: Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Harlan Stenn <stenn@nwtime.org> Thu, 11 August 2022 12:14 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F851C147930 for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 05:14:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.104
X-Spam-Level:
X-Spam-Status: No, score=-1.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iCel8ZiYhaXY for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 05:14:30 -0700 (PDT)
Received: from chessie.everett.org (unknown [IPv6:2001:470:1:205::234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D9EE9C14CF1B for <ntp@ietf.org>; Thu, 11 Aug 2022 05:14:30 -0700 (PDT)
Received: from [10.208.75.149] (071-084-168-128.res.spectrum.com [71.84.168.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M3Qj244BVzMP49; Thu, 11 Aug 2022 12:14:30 +0000 (UTC)
Message-ID: <9ecdfcfa-1ab3-1068-c60f-79968452ef81@nwtime.org>
Date: Thu, 11 Aug 2022 05:14:29 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: Martin Burnicki <martin.burnicki@meinberg.de>, Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>, "ntp@ietf.org" <ntp@ietf.org>, halmurray@sonic.net
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <7eef9a6f-a115-b009-24e5-2b96a8bc02ae@meinberg.de> <62F23E8A020000A10004C393@gwsmtp.uni-regensburg.de> <1adca9bf-81fa-189f-ae13-47c049e02721@meinberg.de> <7a445ad1-f93c-8c18-834c-503c60f17911@nwtime.org> <YvTlJYigcXtZtXGS@localhost>
From: Harlan Stenn <stenn@nwtime.org>
In-Reply-To: <YvTlJYigcXtZtXGS@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/CeuKzcsE-Wsck66Yr8PsFtHpKCk>
Subject: Re: [Ntp] Antw: Re: Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2022 12:14:35 -0000


On 8/11/2022 4:16 AM, Miroslav Lichvar wrote:
> On Thu, Aug 11, 2022 at 03:43:54AM -0700, Harlan Stenn wrote:
>> The design is that the base packet for a given NTP protocol stays the same
>> for future protocol versions.  If new info is wanted, it is APPENDED to the
>> packet.  The easiest way to get new stuff there might be to use EFs, rather
>> than by changing the base packet format and size.
> 
> Maybe that was the original intention, but if it's not specified
> anywhere I don't think we should be prevented from making incompatible
> changes in the protocol.

TANSSAAFL.

We make our choices and live with the consequences.

>> If v5 comes along and makes the base packet larger, it should do so by
>> appending the new data after the v4 base packet boundary.  Looking at A.5.3
>> (fast_xmit()) in 5905, a v5 server would respond to a v5 client request with
>> a v5 packet that is the expected size.  But a v4 (or v3) server would
>> respond with a v5 version number in the header area with a base packet
>> length of (to use the above example) 40 bytes.  The originating system would
>> see it got a v5 response with a short length. That packet should be
>> perfectly usable (as a v4 response).
> 
> If you look at A.5.1 in RFC5905, you will see
> 
> 	if (r->version > VERSION /* or format error */)
> 		return;                 /* format error */
> 
> That is, an NTPv4 server is supposed to drop an NTPv5/6/7 request.

Yes, that was the original plan.  And since that time, Dave Mills (et 
al) decided that was a (needless) restriction that made upward 
compatibility harder.  So that restriction was removed from the code.

-- 
Harlan Stenn <stenn@nwtime.org>
http://networktimefoundation.org - be a member!