Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Harlan Stenn <stenn@nwtime.org> Thu, 11 August 2022 11:55 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0505AC14F749 for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 04:55:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.105
X-Spam-Level:
X-Spam-Status: No, score=-1.105 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8JBXvjUqvpwh for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 04:55:27 -0700 (PDT)
Received: from chessie.everett.org (unknown [IPv6:2001:470:1:205::234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6912BC14F735 for <ntp@ietf.org>; Thu, 11 Aug 2022 04:55:27 -0700 (PDT)
Received: from [10.208.75.149] (071-084-168-128.res.spectrum.com [71.84.168.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M3QH31fc9zMP49; Thu, 11 Aug 2022 11:55:27 +0000 (UTC)
Message-ID: <64602bd6-c6b9-a97e-43fb-19acb1defff7@nwtime.org>
Date: Thu, 11 Aug 2022 04:55:26 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: ntp@ietf.org
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <8122203e-ac66-e4d7-5a52-5d053d8fa06a@nwtime.org> <YvIXDS2EkxzI0nTh@localhost> <9d304a6f-5570-0dad-d64d-b8ade71871e3@nwtime.org> <YvIthoUI7HtKpD9E@localhost> <126f817a-5132-ca64-8f12-45e9d33cdae0@nwtime.org> <YvTcvTbhE7sg0eMo@localhost>
From: Harlan Stenn <stenn@nwtime.org>
In-Reply-To: <YvTcvTbhE7sg0eMo@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/F_WSyyR-8Rw3rU4ufjf_u4rKeKI>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2022 11:55:31 -0000

On 8/11/2022 3:41 AM, Miroslav Lichvar wrote:
> On Thu, Aug 11, 2022 at 03:02:16AM -0700, Harlan Stenn wrote:
>> On 8/9/2022 2:48 AM, Miroslav Lichvar wrote:
>>> On Tue, Aug 09, 2022 at 02:22:32AM -0700, Harlan Stenn wrote:
>>>> On 8/9/2022 1:13 AM, Miroslav Lichvar wrote:
>>>>> On Mon, Aug 08, 2022 at 10:33:12PM -0700, Harlan Stenn wrote:
>>>>>>> NIST servers respond to NTPV4 requests with NTPv3.
>>>>>>
>>>>>> which works perfectly with V4 clients, and it works because of the way the
>>>>>> protocol was designed and has worked for ntp V1-V4.
>>>>>
>>>>> It works only with clients that support NTPv3. Not all clients do
>>>>> that. And v1 is not compatible with v2-v4. There is no mode field yet.
>>>>
>>>> I don't understand "clients that support NTPv3".  I know that ntpd (which
>>>> has been v4 for nearly 25 years' time) talks with NIST just fine.
>>>
>>> Because ntpd kept the NTPv3 support when it added NTPv4. The NTPv3
>>> support is broken in some ways, e.g. it accepts Autokey extension
>>> fields which is not possible in NTPv3.
>>
>> How would an NTPv3 system negotiate Autokey?
> 
> An NTPv3 client cannot use Autokey, but when ntpd is configured with
> "version 3", it sends and accepts invalid NTPv3 messages with Autokey
> extension fields. That's a bug.

Perhaps.

What happened to "be conservative in what you send and liberal in what 
you receive"?

I agree it's certainly fine for one side or the other to either allow or 
reject it.

I don't agree that it's a bug.

>>> Some client implementations support NTPv4 only and don't accept an
>>> NTPv3 response.
>>
>> That's fine.  Is there an issue with this?
> 
> It doesn't work with servers that respond with NTPv3, i.e. the "which
> works perfectly with V4 clients" quoted at the beginning of this email
> is not true.

I still don't see the problem.

We have responsibilities *to* others, not *for* them.

The reference implementation follows the pseudocode I previously cited 
regarding how responses are made - it responds with the same version 
that the client packet used.

So it doesn't do this.

If some other implementation does, bring it up with them.

>> Dave Mills and I have each wondered what your NTPv5 proposals will do that
>> cannot be implemented by using the v4 packet format and extension fields.
> 
> Nothing. You could do everything with new NTPv4 extension fields.
> There was even a proposal in that direction to get around RFC7822:
> 
> https://datatracker.ietf.org/doc/html/draft-mlichvar-ntp-short-extension-fields-01
> 
> But there seems to be a consensus we should make a clean break and
> address the issues properly instead of doing ugly hacks.

Beauty is in the eye of the beholder.

7822 needlessly (IMO) increases the size of some NTP packets.  If 
somebody decides to implement a legacy MAC with a bigger payload, 7822 
will not help.

>> Folks here have also said that they expect "separate engines" for v4 and v5
>> packets in their NTP code.  If that's the case, who cares if the EFs are the
>> same or if they're different?
> 
> It will simplify the implementations that want to support both. The
> code that looks for extension fields in an NTP message can be separate
> from the code that generates or parses the actual extension fields.

That may be true for *some* implementations.

Again, it depends on the direction future packet versions take.

-- 
Harlan Stenn <stenn@nwtime.org>
http://networktimefoundation.org - be a member!