[Ntp] Antw: [EXT] Re: SNTP, Old crufty software

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Tue, 16 August 2022 07:56 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECD89C159821 for <ntp@ietfa.amsl.com>; Tue, 16 Aug 2022 00:56:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5-xSIrYjamyc for <ntp@ietfa.amsl.com>; Tue, 16 Aug 2022 00:56:08 -0700 (PDT)
Received: from mx4.uni-regensburg.de (mx4.uni-regensburg.de [194.94.157.149]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 80F76C14CE39 for <ntp@ietf.org>; Tue, 16 Aug 2022 00:56:08 -0700 (PDT)
Received: from mx4.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id A3F08600004E for <ntp@ietf.org>; Tue, 16 Aug 2022 09:56:04 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx4.uni-regensburg.de (Postfix) with ESMTP id 85DC9600004A for <ntp@ietf.org>; Tue, 16 Aug 2022 09:56:04 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Tue, 16 Aug 2022 09:56:04 +0200
Message-Id: <62FB4D93020000A10004C59A@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.4.1
Date: Tue, 16 Aug 2022 09:56:03 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: doug.arnold=40meinberg-usa.com@dmarc.ietf.org, jamesb.fe80@gmail.com, "ntp@ietf.org" <ntp@ietf.org>
References: <20220811222515.06CF528C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <B3AA99BF-7AEB-46B9-A756-012A242524D2@gmail.com> <CAFTY+dAN39OutFE9WZGDr8O=iAtLAXi=jnu5ALDHkwD48xrNZw@mail.gmail.com> <AM7PR02MB576592D7F7DEAAF23CC7E437CF679@AM7PR02MB5765.eurprd02.prod.outlook.com>
In-Reply-To: <AM7PR02MB576592D7F7DEAAF23CC7E437CF679@AM7PR02MB5765.eurprd02.prod.outlook.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/PvPTnfG2X9ekfMX8lf-yyup569Y>
Subject: [Ntp] Antw: [EXT] Re: SNTP, Old crufty software
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2022 07:56:11 -0000

>>> Doug Arnold <doug.arnold=40meinberg-usa.com@dmarc.ietf.org> schrieb am
12.08.2022 um 16:46 in Nachricht
<AM7PR02MB576592D7F7DEAAF23CC7E437CF679@AM7PR02MB5765.eurprd02.prod.outlook.com>

> A lot of (understaffed) IT teams are consumed by solving the current biggest

> problem.  So they are not deciding to leave old ntp versions because they
are 
> working, but rather they don’t know that they are there at all.  They were 
> installed before years ago by someone else and haven’t caused a problem that

> resulting in an upgrade to a newer version of ntp.  .
> 
> I think that the best way to handle old versions of NTP is for servers to 
> respond to NTP requests in the same version that they received.  People 

Well, I think no software can fix management or operating mistakes:
A company should know what servers and clients it runs.
And I think there is kind of agreement that NTP servers may respond to older
protocol requests as long as they support those.
But that will mean eventually that some requests won't be answered forever.

> implementing NTP servers can select which versions of NTP they will support,

> with the ability of a network admin to turn the versions on or off by 
> configuration.  NTP clients could start with the most recent version of NTP

> they support and work down.

I think the obvious "must requirement" for a new NTP version is that the
previous "official" version must be supported as well.
Still, implementers have the choice to support even older versions.
But as Intel dropped 16 bit support in their latest CPUs, some of the ancient
NTP versions have to be dropped some day.

Regards,
Ulrich

> 
> Doug
> 
> From: ntp <ntp‑bounces@ietf.org> on behalf of James Browning 
> <jamesb.fe80@gmail.com>
> Date: Friday, August 12, 2022 at 7:34 AM
> To: NTP WG <ntp@ietf.org>
> Subject: Re: [Ntp] SNTP, Old crufty software
> On Fri, Aug 12, 2022, 04:06 James 
> <james.ietf@gmail.com<mailto:james.ietf@gmail.com>> wrote:
> What (dis)incentives are there for the people and companies writing, 
> reusing, deploying code still using these protocols to work on them? I'm not

> sure there is many given "it still just works". A well defined carrot (e.g.
a 
> simpler/secure/etc protocol) or stick (popular public time services ceasing

> support for legacy protocols) are the only dimensions I can think of here.
> 
> I'm not sure the effort of trying to ‑bis SNTP is as beneficial as advancing

> newer work like Roughtime and its implementations, combined with BCPs or 
> other such guidance that dissuade future use of these older protocols.
> 
> We had simpler protocols that turned out to be amplifiers, I tried killing 
> off the broken crap in NTPsec before having the 'stick' taken away and being

> beaten with it.