Re: [Ntp] Antw: Re: Antw: Re: Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt

Danny Mayer <mayer@pdmconsulting.net> Fri, 22 October 2021 11:43 UTC

Return-Path: <mayer@pdmconsulting.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1BCC83A0A88 for <ntp@ietfa.amsl.com>; Fri, 22 Oct 2021 04:43:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level:
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9sJHskmn90F8 for <ntp@ietfa.amsl.com>; Fri, 22 Oct 2021 04:43:24 -0700 (PDT)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A40D13A0A84 for <ntp@ietf.org>; Fri, 22 Oct 2021 04:43:20 -0700 (PDT)
Received: from [192.168.1.242] (pool-108-26-179-179.bstnma.fios.verizon.net [108.26.179.179]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4HbMt94JGSzMNR1; Fri, 22 Oct 2021 11:43:13 +0000 (UTC)
Message-ID: <cc5fb67c-a2a8-1f18-37a7-c79a80326ed2@pdmconsulting.net>
Date: Fri, 22 Oct 2021 07:43:12 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Thunderbird/91.2.0
Content-Language: en-US
To: Martin Burnicki <martin.burnicki=40meinberg.de@dmarc.ietf.org>, Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>, doug.arnold=40meinberg-usa.com@dmarc.ietf.org, mlichvar@redhat.com, halmurray+ietf@sonic.net
Cc: "ntp@ietf.org" <ntp@ietf.org>
References: <D19C98F0020000AAAB822621@gwsmtp.uni-regensburg.de> <B6193D9D02000051AB59E961@gwsmtp.uni-regensburg.de> <84735FB40200007C44DF974D@gwsmtp.uni-regensburg.de> <236983740200003E824A10E1@gwsmtp.uni-regensburg.de> <CEFD0B92020000436A6A8CFC@gwsmtp.uni-regensburg.de> <616E7B69020000A10004491E@gwsmtp.uni-regensburg.de> <DB577C29020000EF6A6A8CFC@gwsmtp.uni-regensburg.de> <616E933D020000A100044957@gwsmtp.uni-regensburg.de> <72083C72020000E06A6A8CFC@gwsmtp.uni-regensburg.de> <D11527C602000032FDA5B133@gwsmtp.uni-regensburg.de> <9E2EA18B020000B86A6A8CFC@gwsmtp.uni-regensburg.de> <6EFADD85020000BDFDA5B133@gwsmtp.uni-regensburg.de> <61714B21020000A100044B83@gwsmtp.uni-regensburg.de> <AM7PR02MB576513760641C35EB5B43673CFBF9@AM7PR02MB5765.eurprd02.prod.outlook.com> <61727020020000A100044BE7@gwsmtp.uni-regensburg.de> <c1e5ade3-2693-c684-66de-0c306036dc1e@meinberg.de>
From: Danny Mayer <mayer@pdmconsulting.net>
In-Reply-To: <c1e5ade3-2693-c684-66de-0c306036dc1e@meinberg.de>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/EXGUkLiu8v02RPDDsSQ-1WMcKYk>
Subject: Re: [Ntp] Antw: Re: Antw: Re: Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Oct 2021 11:43:29 -0000

On 10/22/21 6:00 AM, Martin Burnicki wrote:
> Am 22.10.21 um 10:02 schrieb Ulrich Windl:
>>>>> Doug Arnold <doug.arnold=40meinberg-usa.com@dmarc.ietf.org> 
>>>>> schrieb am
>> 21.10.2021 um 15:36 in Nachricht
>> <AM7PR02MB576513760641C35EB5B43673CFBF9@AM7PR02MB5765.eurprd02.prod.outlook.com> 
>>
>>
>>> One thing to keep in mind is that the use case for leap smearing is 
>>> that it
>>> happens in a private network, where all Stratum 1 servers are 
>>> configured the
>>> same.  I still consider it dangerous, though.
>
> I fully agree. Smearing is just a hack to circumvent limitations of 
> the underlying time synchronization, and avoid even worse problem that 
> would occur without smearing.
>
> The main problem is with applications that get confused when the 
> system time (UTC, or a local time derived from it) unexpectedly steps 
> back by 1 second if a leap second is introduced.
>
> In my opinion it doesn't really help if the system clock runs on TAI 
> because unless applications have explicitly designed to take care of 
> leap seconds would still request UTC or local time from the operating 
> system, and thus would observe the same, unexpected time step back if 
> the kernel clock runs TAI and adds the TAI/UTC offset in the reply to 
> the query.
>
> The only ways to avoid the problems would be to either abolish leap 
> seconds, or fix all applications to work with TAI and convert to UTC 
> or local time themselves, or to be aware the time steps back due to a 
> leap second are a normal case that needs to be handled, similar as the 
> local time step back at the end of DST.
>
>> We could demand that a smearing server may only respond to 
>> authenticated packets (maybe even specific keys), so clients 
>> expecting leap smear would have to provide some cryptographic key to 
>> the server.
>> A clients querying the server by mistake wuld not get a response then.
>
> No. Exactly the other way round. Smearing is to hide the leap second 
> from downstream nodes, even from dumb clients.
>
> As I've tried to point out earlier, in any case it's the task of an 
> administrator to ensure a proper configuration:
>
> - If there are smearing and not-smearing servers, he has to configure 
> which clients should query the time from which servers.
>
> - If the clients should do the smearing, he had to configure each 
> individual client whether to smear, or not.
>
> - If a smearing server would only reply to authenticated requests, he 
> had to configure on each client which server(s) to use, and which 
> keys, and it wouldn't even be possible to hide the leap second from 
> dumb clients.
>
You also need to worry about the cascading effects of a server accepting 
smeared time turning around a sending out smeared timestamps in response 
to requests from downstream clients. Smearing cannot be considered in 
isolation.

Danny