Re: [Ntp] I-D Action: draft-mlichvar-ntp-over-ptp-03.txt

"Langer, Martin" <mart.langer@ostfalia.de> Mon, 27 March 2023 18:16 UTC

Return-Path: <mart.langer@ostfalia.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26F5BC1522A4 for <ntp@ietfa.amsl.com>; Mon, 27 Mar 2023 11:16:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.896
X-Spam-Level:
X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XDRvzvdS06jh for <ntp@ietfa.amsl.com>; Mon, 27 Mar 2023 11:16:45 -0700 (PDT)
Received: from mx2.sonia.de (mx2.sonia.de [141.41.1.238]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 421E4C1522AD for <ntp@ietf.org>; Mon, 27 Mar 2023 11:16:43 -0700 (PDT)
Received: from mx2.sonia.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 2E0381080318 for <ntp@ietf.org>; Mon, 27 Mar 2023 20:16:40 +0200 (CEST)
Received: from exchange01.resource.sonia.de (exchange01.resource.sonia.de [141.41.8.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mx2.sonia.de (Postfix) with ESMTPS id 234FE1080317 for <ntp@ietf.org>; Mon, 27 Mar 2023 20:16:37 +0200 (CEST)
From: "Langer, Martin" <mart.langer@ostfalia.de>
To: "ntp@ietf.org" <ntp@ietf.org>
Thread-Topic: [Ntp] I-D Action: draft-mlichvar-ntp-over-ptp-03.txt
Thread-Index: AQHZUPOjmoEPf4KN0UGQKL5ODOr8DK8OwvDz///tDICAAFsnDQ==
Date: Mon, 27 Mar 2023 18:16:37 +0000
Message-ID: <bfe4c4f1a7d64f3e8840b71df5f4dc60@ostfalia.de>
References: <167819348731.61111.17805820073382061341@ietfa.amsl.com> <5a503d60208a4605a94df5e37097cfc2@ostfalia.de>,<ZCGqPxe6fCle4E7o@localhost>
In-Reply-To: <ZCGqPxe6fCle4E7o@localhost>
Accept-Language: de-DE, en-US
Content-Language: de-DE
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [141.41.8.54]
Content-Type: multipart/alternative; boundary="_000_bfe4c4f1a7d64f3e8840b71df5f4dc60ostfaliade_"
MIME-Version: 1.0
X-SONIA-SPAM-Probability:
X-Rspamd-UID: 84dcc1
X-Rspamd-Queue-Id: 234FE1080317
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/MTPj6te2Jz_SdG2dw_6d2W9QWng>
Subject: Re: [Ntp] I-D Action: draft-mlichvar-ntp-over-ptp-03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 Mar 2023 18:16:49 -0000

Thank you Miroslav :)


The draft should emphasize, unless I missed it, that no "working" PTP is required. At first I thought that NTP-over-PTP is bound to a working PTP network. This is not the case.  It just uses PTP messages as a frame for NTP messages to use hardware time stamping and it could run without any conflicts next to PTP.

The TLV thing would still need to be clarified. IDs for the IETF are not known to me at this time.

best regards,
martin

-------------------
Martin Langer, M.Eng.
Ostfalia Hochschule für angewandte Wissenschaften
- Hochschule Braunschweig/Wolfenbüttel
University of Applied Sciences

Labor Datentechnik, Labor Design Digitaler Systeme
Fakultät Elektrotechnik
Salzdahlumer Straße 46/48
38302 Wolfenbüttel
Germany

Tel.: +49 5331 939 43370
Web: https://www.ostfalia.de/cms/de/pws/bermbach/mitarbeiter/martin-langer


________________________________
Von: ntp <ntp-bounces@ietf.org> im Auftrag von Miroslav Lichvar <mlichvar@redhat.com>
Gesendet: Montag, 27. März 2023 16:37:51
An: ntp@ietf.org
Betreff: Re: [Ntp] I-D Action: draft-mlichvar-ntp-over-ptp-03.txt

On Mon, Mar 27, 2023 at 01:49:12PM +0000, Langer, Martin wrote:
> I read your draft and added a few comments. I hope it helps you a bit.

That's great. Thank you.

> I still have one general question about it. Are the hardware timestamps written
> directly to the NTP TLV? I didn't find anything about this in the draft.

The draft is about enabling hardware receive timestamps on hardware
which can timestamp only PTP messages. The hardware is not expected to
modify the message. The timestamps have to be fetched by the
networking driver from some specific registers of the NIC. This limits
the maximum rate of timestamping and is the reason why PTP uses two
UDP ports. The event port is used only for messages that needs to be
timestamped.

To answer some of the questions you added to the pdf:

One-step mode doesn't matter here as that is for transmit timestamps,
not receive timestamps.

The lack of on-path support was mentioned as an advantage of
NTP-over-PTP, because it still processes measurements as NTP and
doesn't assume a constant network delay (changing only on network
reconfiguration or server reselection).

Symmetric mode works in NTP-over-PTP and still cannot be secured by
NTS.

There doesn't have to be an actual PTP clock with ports in some
specific PTP state operating on the NTP server or client. There could
be a PTP clock in other domain or transport, but doesn't have to be.

I'm not sure how exactly it works with specifying new TLVs for PTP.
Does IETF have an organization Id we could use?

NTP request and NTP response are both included in a PTP delay request.

Modifying the PTP sequenceId (not protected by NTP authentication)
doesn't matter for NTP. We just need the hardware+driver to not
deduplicate the messages in case they actually look at the value. A
MITM attacker can always cause a denial of service.

--
Miroslav Lichvar

_______________________________________________
ntp mailing list
ntp@ietf.org
https://www.ietf.org/mailman/listinfo/ntp