Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Harlan Stenn <stenn@nwtime.org> Tue, 09 August 2022 09:22 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE519C15C520 for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 02:22:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UTzCWch5qQGx for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 02:22:34 -0700 (PDT)
Received: from chessie.everett.org (chessie.everett.org [66.220.13.234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4DCFEC14F724 for <ntp@ietf.org>; Tue, 9 Aug 2022 02:22:34 -0700 (PDT)
Received: from [10.208.75.149] (071-084-168-128.res.spectrum.com [71.84.168.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M26zZ0V34zMP3d; Tue, 9 Aug 2022 09:22:34 +0000 (UTC)
Message-ID: <9d304a6f-5570-0dad-d64d-b8ade71871e3@nwtime.org>
Date: Tue, 09 Aug 2022 02:22:32 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: Hal Murray <halmurray@sonic.net>, "ntp@ietf.org" <ntp@ietf.org>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <8122203e-ac66-e4d7-5a52-5d053d8fa06a@nwtime.org> <YvIXDS2EkxzI0nTh@localhost>
From: Harlan Stenn <stenn@nwtime.org>
In-Reply-To: <YvIXDS2EkxzI0nTh@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/M3xjC5H-0Q7w_bpKvqCWn_33G78>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 09:22:38 -0000

On 8/9/2022 1:13 AM, Miroslav Lichvar wrote:
> On Mon, Aug 08, 2022 at 10:33:12PM -0700, Harlan Stenn wrote:
>>> NIST servers respond to NTPV4 requests with NTPv3.
>>
>> which works perfectly with V4 clients, and it works because of the way the
>> protocol was designed and has worked for ntp V1-V4.
> 
> It works only with clients that support NTPv3. Not all clients do
> that. And v1 is not compatible with v2-v4. There is no mode field yet.

I don't understand "clients that support NTPv3".  I know that ntpd 
(which has been v4 for nearly 25 years' time) talks with NIST just fine.

I haven't seen any v1 clients in ages.  For that matter, I don't think 
I've ever seen a v1 client request come in (OK, nobody has reported that 
they could not sync a v1 client with a v3 or a v4 server).

I similarly don't know about v2.  And again, nobody has reported that 
they could not sync a v2 client to a v3 or a v4 server.

I guess I just don't understand what you're trying to accomplish here.

> Responding with NTPv3 to an NTPv4 request is ok when you know that the
> NTPv4 header is compatible with NTPv3.

Is the NTPv3 base packet compatible with an NTPv4 base packet?

Is an NTPv4 base packet compatible with an NTp3 base packet?

> The bigger issue is that the NIST servers are responding with NTPv3
> even to NTPv5 requests, which is not specified yet. There is nothing
> in RFC1305 or RFC5905 that would guarantee future compatibility.

I submit that the answer to this depends strongly on the format of a v5 
packet.

> NTPv5 needs to be designed in such a way that if it is misinterpreted
> as NTPv3 or NTPv4, it will produce an invalid response that will be
> ignored by the client. The current proposal has that property.

I submit better behavior would be for a v3 or v4 client to be able to 
*use* a v5 response.

>> It sure looks to me like the NTPv5 work will be breaking this.
> 
> Well, if NTPv5 is expected to have incompatible changes like shorter
> extension fields, it cannot be compabile with NTPv4. If it was
> compatible with NTPv4, it wouldn't have to change to NTPv5.

Where is it written that a v4 EF must be compatible with a v5 packet?

And if one requires 7822 header lengths for compatibility, great.

The reference implementation supports both, but we do not require 7822 
minimum lengths because they are demonstrably not needed.

-- 
Harlan Stenn <stenn@nwtime.org>
http://networktimefoundation.org - be a member!