Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Martin Burnicki <martin.burnicki@meinberg.de> Tue, 09 August 2022 10:54 UTC

Return-Path: <martin.burnicki@meinberg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E4D4EC159486 for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 03:54:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=meinberg.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id buoZF-7v63zU for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 03:54:33 -0700 (PDT)
Received: from server1a.meinberg.de (server1a.meinberg.de [176.9.44.212]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 229E8C157B58 for <ntp@ietf.org>; Tue, 9 Aug 2022 03:54:32 -0700 (PDT)
Received: from seppmail.py.meinberg.de (unknown [193.158.22.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by server1a.meinberg.de (Postfix) with ESMTPSA id 4736C71C0065; Tue, 9 Aug 2022 12:54:29 +0200 (CEST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=meinberg.de; s=d2021; t=1660042469; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=V/iJD74FtOzN+hDDi/Jt+gwG3O66jrQpbyS0XCvRFg4=; b=UJ01LyUs7IiPDfleMtPsHCK/zfD+FFJasydP2vSfCZk7EMjmISoawbngpWXMxPqTw1WtO+ or6MIQQYtebx1kEGuCCPxpOi4E/gNeQJNPtlhynnk4xdSs+5J+5/Ji8Ark5yLmOVz1zoq2 vjsO7WPS4eirDeesZHvbsSBdW8Mwr6Ezz8IGin39HyNQZzfuZ+fyLW8En3Hwx3D4O4zb2s yPD6nrkO4TmXUwm6zDOOwuuJeuar8CnMdyhONsM5PJcJVI1jAWUYhBhPEfRGa7xYAgyP69 AbLVY4/1zLe/tIMdER/tuLpq38O3wK5BmTHdLZgJIu5r1/ml66nkJ9sB85YIVw==
Received: from srv-kerioconnect.py.meinberg.de (srv-kerioconnect.py.meinberg.de [172.16.3.65]) (using TLSv1.3 with cipher AEAD-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by seppmail.py.meinberg.de (Postfix) with ESMTPS; Tue, 9 Aug 2022 12:54:28 +0200 (CEST)
X-Footer: bWVpbmJlcmcuZGU=
Received: from localhost ([127.0.0.1]) by srv-kerioconnect.py.meinberg.de with ESMTPSA (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)); Tue, 9 Aug 2022 12:54:27 +0200
Message-ID: <df2bce4f-9bcf-8f02-6074-501bbc8e5655@meinberg.de>
Date: Tue, 09 Aug 2022 12:54:27 +0200
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.9.0
Content-Language: en-US
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: "ntp@ietf.org" <ntp@ietf.org>, Hal Murray <halmurray@sonic.net>, Harlan Stenn <stenn@nwtime.org>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <7eef9a6f-a115-b009-24e5-2b96a8bc02ae@meinberg.de> <YvI4qRV+MOrmYKey@localhost>
From: Martin Burnicki <martin.burnicki@meinberg.de>
Organization: Meinberg Funkuhren GmbH & Co. KG, Bad Pyrmont, Germany
In-Reply-To: <YvI4qRV+MOrmYKey@localhost>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="------------fzul7n06BBcjf3ytD0Q0e0n9"
X-SM-outgoing: yes
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/OgcaF4uZjdVyKAaXaMAfF5KfMV8>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 10:54:38 -0000

Miroslav Lichvar wrote:
> On Tue, Aug 09, 2022 at 12:17:06PM +0200, Martin Burnicki wrote:
>> That means:
>>
>> - if a v4 server gets v3 request, it should respond with v3
>> - if a v4 server gets v4 request, it should respond with v4
>> - if a v4 server gets v5 request, it should respond with v4
>>
>> The latter should only work if a v5 base packet is compatible with a v4 base
>> packet. Otherwise a v4 server wouldn't even recognize and accept a request
>> from a v5 client.
> 
> The proposed NTPv5 header is not compatible with NTPv4. Servers can
> support multiple versions. If they support NTPv5, they should respond
> with NTPv5. If they don't support NTPv5, they shouldn't respond with
> anything.

What I was trying to describe is how the original ntpd used to handle 
such interaction between different versions in the past.

If not even the v5 base packet format is compatible, this of course 
doesn't work for NTPv5, and in this case of course the server needs to 
respond with a valid v5 packet.

> Servers that don't check the version field and respond with a NTPv4
> response marked as NTPv5 will be ignored by the clients as the client
> cookie will not match the request.

Yes, of course, if NTPv5 is basically different than NTPv4.

>> What does make sense, IMO, is a server which can handle *both* types of
>> extension fields, to be able to serve time to both old and new clients.
>>
>> So the server implementation could
>>
>> - check whether a request has extension fields at all
>> - if there are, check for plausibility of a chain of new EFs
>> - if check of the new EFs fails, try the old EFs
>> - use the new or old EF formats in responses to clients
> 
> There should be no ambiguity with extension fields. NTPv5 is expected
> to be compatible with NTPv4 extension fields. The main use case will
> be NTS. Autokey is insecure and should not be used.

I know that, and I agree, and I only used this as example for "legacy" 
extension fields.

> NTPv5 extension fields could be contained in NTPv4 packets if the
> length was divisible by 4 and it met the RFC7822 requirements, but I'm
> not sure why would an NTPv5-capable client talk with a NTPv5-capable
> server using NTPv4 with NTPv5 extension fields.

The use case I meant was with a v4 server and a v4 client.


Martin
-- 
Martin Burnicki

Senior Software Engineer

MEINBERG Funkuhren GmbH & Co. KG
Email: martin.burnicki@meinberg.de
Phone: +49 5281 9309-414
Linkedin: https://www.linkedin.com/in/martinburnicki/

Lange Wand 9, 31812 Bad Pyrmont, Germany
Amtsgericht Hannover 17HRA 100322
Geschäftsführer/Managing Directors: Günter Meinberg, Werner Meinberg, 
Andre Hartmann, Heiko Gerstung
Websites: https://www.meinberg.de  https://www.meinbergglobal.com