Re: [Ntp] Objections to the current language in draft-ietf-data-minimization

Heiko Gerstung <heiko.gerstung@meinberg.de> Tue, 26 March 2019 11:47 UTC

Return-Path: <heiko.gerstung@meinberg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8370120300 for <ntp@ietfa.amsl.com>; Tue, 26 Mar 2019 04:47:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.29
X-Spam-Level:
X-Spam-Status: No, score=-4.29 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=meinberg.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vETdlcP9keW5 for <ntp@ietfa.amsl.com>; Tue, 26 Mar 2019 04:47:53 -0700 (PDT)
Received: from server1a.meinberg.de (server1a.meinberg.de [176.9.44.212]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0BBB120305 for <ntp@ietf.org>; Tue, 26 Mar 2019 04:47:52 -0700 (PDT)
Received: from srv-kerioconnect.py.meinberg.de (unknown [193.158.22.2]) (using TLSv1.1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by server1a.meinberg.de (Postfix) with ESMTPSA id D1D8871C03CC; Tue, 26 Mar 2019 12:47:48 +0100 (CET)
X-DKIM: Sendmail DKIM Filter v2.8.2 server1a.meinberg.de D1D8871C03CC
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=meinberg.de; s=mail201101; t=1553600871; bh=9cz5G40N95206dF/Rp/DeHlHhk7u2DzGHiHEiCnGwvw=; h=Date:Subject:Message-ID:References:In-Reply-To:Mime-version:From: To:Cc:Content-Type:Content-Transfer-Encoding; b=V0Ir5gfcK/5rDVc0aRYXuffzUVw61Zs4X6GF8R4RaCgItDVg56bDUUt76TXoIWgaz Cp9sKzOH2uWVPh7pcq+MueVUAAIr2LWZ6j+23vv+KX24yV43KsZ/YpmzXJBdwblsMQ qR9PT5NAx1GJIig45uzcrWtDGh9cTp16RNOQ37co=
X-Kerio-Anti-Spam: Build: [Engines: 2.15.9.1226, Stamp: 3], Multi: [Enabled, t: (0.000006,0.008687)], BW: [Enabled, t: (0.000006)], RTDA: [Enabled, t: (0.035159), Hit: No, Details: v2.7.31; Id: 15.1i6o8ag.1d6st7rgt.8541b], total: 0(700)
X-Footer: bWVpbmJlcmcuZGU=
User-Agent: Microsoft-MacOutlook/10.17.0.190309
Date: Tue, 26 Mar 2019 12:47:45 +0100
Message-ID: <20BF3CA9-5B4C-4DAA-A45F-F0E04AA2EDB3@meinberg.de>
Thread-Topic: [Ntp] Objections to the current language in draft-ietf-data-minimization
References: <8b9e85cb-3d6a-4e71-cbe7-9956e301a22d@nwtime.org> <CACsn0c=SrDXWNg7pNFHy0yLKugNLTADMbE9ae4iiNAhNPc6Y8g@mail.gmail.com> <85ab5d77-d6a1-17ba-0b73-4664f33cd3c0@nwtime.org> <6164D9F6-DE61-45A6-B557-528643BEA14D@gmail.com> <8bec3d35-5e4d-e920-02d3-f8ed58544891@nwtime.org> <79b669d6-e4aa-a3d1-b2f9-c9cabab8d8b5@nwtime.org>
In-Reply-To: <79b669d6-e4aa-a3d1-b2f9-c9cabab8d8b5@nwtime.org>
Mime-version: 1.0
Importance: Normal
X-Priority: 3
Thread-Index: AZ2x3tU+MjU2MTVkMTBlYmNmNmEwZQ==
From: Heiko Gerstung <heiko.gerstung@meinberg.de>
To: Harlan Stenn <stenn@nwtime.org>, Dieter Sibold <dsibold.ietf@gmail.com>
Cc: Watson Ladd <watsonbladd@gmail.com>, "ntp@ietf.org" <ntp@ietf.org>
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Virus-Scanned: clamav-milter 0.100.2 at server1a
X-Virus-Status: Clean
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/QHQChH5moiI2X5cKjA2u5HyMBGc>
Subject: Re: [Ntp] Objections to the current language in draft-ietf-data-minimization
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Mar 2019 11:48:07 -0000

Hi everyone,
(sorry for top-posting, Outlook is crap when it comes to quoting correctly)

I believe that the leap smearing approach has been invented in order to avoid that clients (or their OS) which do not implement leap seconds properly, survive a leap second event without time steps. The leap smearing as it has been implemented in most cases does NOT prevent clients which should not use leap smearing for various reasons (e.g. legal requirements) to sync to an leap-smearing NTP server. IMHO we should find a way to avoid that a client expecting correct time is not served with smeared time. This includes the gazillion clients out in the field not knowing about special refids or extension fields. They send an RFC compliant request (well, most of them do) to a server and expect the response to be correct time.

I therefore would want to see that an NTP server per default is only sending smeared time to clients which specifically ask for it. As far as I can see this could only be done using an extension field in the request, as all wiggling with the header fields of an incoming NTP request is always based on an assumption what exactly the NTP clients knows and wants. And this may be true for most clients, but not for all. I have seen a lot of embedded crude NTP implementations in the field and although I am all for some educational punishment in case some software engineer did not read the entire standard before implementing a client which is not compliant or behaves crazy in our opinion (100ms polling interval anyone?), I would like to avoid messing things up with all these implementations out there. 

I can agree to Harlans approach that the configuration should allow corner cases and overriding the standard behavior, but I would like to avoid to break things for all that stuff already deployed. 

Having said that, in case someone chooses to let his NTP server send smeared time but uses standard NTP packets for that (i.e. responses will be accepted by any standards compliant NTP v2, v3 or v4 client), we should definitely clearly mark the fact that this response packet is carrying smeared time using the refid. This way, you can at least see it when you try to debug why your client is slowly drifting away or flipping because someone unintentionally set it up to use two servers providing smeared time and two servers providing correct time. 

Regards,
   Heiko

-- 
Heiko Gerstung 
Managing Director

MEINBERG® Funkuhren GmbH & Co. KG
Lange Wand 9
D-31812 Bad Pyrmont, Germany
Phone:    +49 (0)5281 9309-404
Fax:        +49 (0)5281 9309-9404

Amtsgericht Hannover 17HRA 100322
Geschäftsführer/Management: Günter Meinberg, Werner Meinberg, Andre Hartmann, Heiko Gerstung

Email:
 heiko.gerstung@meinberg.de 
Web:
 Deutsch   https://www.meinberg.de
 English    https://www.meinbergglobal.com

Do not miss our Time Synchronization Blog:
 https://blog.meinbergglobal.com 

Connect via LinkedIn: 
https://www.linkedin.com/in/heikogerstung
 
 

On 26.03.19, 12:27 "ntp im Auftrag von Harlan Stenn" <ntp-bounces@ietf.org im Auftrag von stenn@nwtime.org> wrote:

    Dieter,
    
    I probably should have answered your points with a longer and better
    comment.
    
    I am in no way suggesting that people should use leap smearing.
    
    I am saying that regardless of what sort of time folks want to
    distribute, we should give them the tools and configuration options (the
    "mechanism") that will allow them to make the choices that support their
    goals (the "local policy").
    
    Since the NTP Project has folks who have specifically asked us to
    provide a way to offer leap smearing to their client populations, we
    want to be sure to let them serve their client populations to their
    satisfaction.
    
    ntp-4.4.0 will behave, out of the box, pretty much the way ntp-4.2.8
    does.  Each administrator will simply have the *ability* to better
    customize how they will answer.
    
    Their choices will likely include:
    
    - only send correct time (to everybody)
    - only send leap-smearing time, to all client requests
    - send correct time to clients sending LI=1, and smeared
      time to clients sending LI=0
    
    This will all be configurable on a per-IP or per-network basis.
    
    Do you see any problems with this approach?
    
    H
    
    On 3/26/2019 3:09 AM, Harlan Stenn wrote:
    > Dieter,
    > 
    > On 3/26/2019 3:05 AM, Dieter Sibold wrote:
    >>
    >> ...
    >>
    >> From my point of view these are arguments against leap-smearing and not
    >> against the data minimization draft which from my point of view is
    >> mandatory since it meet modern regulation requirements such as the eu gdpr.
    >>
    >> - Dieter
    > 
    > You are expected to run your systems the way you want, to your
    > specifications.
    > 
    > A GROWING number of public time servers offer leap-smeared time.
    > 
    > This affects a growing number of clients.
    > 
    > I am opposed to using "creative destruction" as a means to force people
    > to do things the way I think they should be done.  I am a big fan of
    > providing people with robust mechanisms to provide the tools implement
    > their local policy choices.
    > 
    
    -- 
    Harlan Stenn, Network Time Foundation
    http://nwtime.org - be a Member!
    
    _______________________________________________
    ntp mailing list
    ntp@ietf.org
    https://www.ietf.org/mailman/listinfo/ntp