Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Harlan Stenn <stenn@nwtime.org> Thu, 11 August 2022 10:02 UTC

Return-Path: <stenn@nwtime.org>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4DDE7C14CF05 for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 03:02:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.106
X-Spam-Level:
X-Spam-Status: No, score=-1.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, NICE_REPLY_A=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XUPpsjx0H_7b for <ntp@ietfa.amsl.com>; Thu, 11 Aug 2022 03:02:27 -0700 (PDT)
Received: from chessie.everett.org (unknown [IPv6:2001:470:1:205::234]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 955D0C14F737 for <ntp@ietf.org>; Thu, 11 Aug 2022 03:02:23 -0700 (PDT)
Received: from [10.208.75.149] (071-084-168-128.res.spectrum.com [71.84.168.128]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by chessie.everett.org (Postfix) with ESMTPSA id 4M3MmZ0V06zMP49; Thu, 11 Aug 2022 10:02:17 +0000 (UTC)
Message-ID: <126f817a-5132-ca64-8f12-45e9d33cdae0@nwtime.org>
Date: Thu, 11 Aug 2022 03:02:16 -0700
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.12.0
Content-Language: en-US
To: Miroslav Lichvar <mlichvar@redhat.com>
Cc: Hal Murray <halmurray@sonic.net>, "ntp@ietf.org" <ntp@ietf.org>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <8122203e-ac66-e4d7-5a52-5d053d8fa06a@nwtime.org> <YvIXDS2EkxzI0nTh@localhost> <9d304a6f-5570-0dad-d64d-b8ade71871e3@nwtime.org> <YvIthoUI7HtKpD9E@localhost>
From: Harlan Stenn <stenn@nwtime.org>
In-Reply-To: <YvIthoUI7HtKpD9E@localhost>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/Sz_ZGNIVwMvW8J6yeD2wrjGSxnE>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Aug 2022 10:02:32 -0000

On 8/9/2022 2:48 AM, Miroslav Lichvar wrote:
> On Tue, Aug 09, 2022 at 02:22:32AM -0700, Harlan Stenn wrote:
>> On 8/9/2022 1:13 AM, Miroslav Lichvar wrote:
>>> On Mon, Aug 08, 2022 at 10:33:12PM -0700, Harlan Stenn wrote:
>>>>> NIST servers respond to NTPV4 requests with NTPv3.
>>>>
>>>> which works perfectly with V4 clients, and it works because of the way the
>>>> protocol was designed and has worked for ntp V1-V4.
>>>
>>> It works only with clients that support NTPv3. Not all clients do
>>> that. And v1 is not compatible with v2-v4. There is no mode field yet.
>>
>> I don't understand "clients that support NTPv3".  I know that ntpd (which
>> has been v4 for nearly 25 years' time) talks with NIST just fine.
> 
> Because ntpd kept the NTPv3 support when it added NTPv4. The NTPv3
> support is broken in some ways, e.g. it accepts Autokey extension
> fields which is not possible in NTPv3.

How would an NTPv3 system negotiate Autokey?

> Some client implementations support NTPv4 only and don't accept an
> NTPv3 response.

That's fine.  Is there an issue with this?

>>> NTPv5 needs to be designed in such a way that if it is misinterpreted
>>> as NTPv3 or NTPv4, it will produce an invalid response that will be
>>> ignored by the client. The current proposal has that property.
>>
>> I submit better behavior would be for a v3 or v4 client to be able to *use*
>> a v5 response.
> 
> That is not possible if we want to make incompatible changes in NTPv5.

That is true.

And at least some of us believe those sort of incompatible changes are a 
Bad Idea.

Dave Mills and I have each wondered what your NTPv5 proposals will do 
that cannot be implemented by using the v4 packet format and extension 
fields.

>>>> It sure looks to me like the NTPv5 work will be breaking this.
>>>
>>> Well, if NTPv5 is expected to have incompatible changes like shorter
>>> extension fields, it cannot be compabile with NTPv4. If it was
>>> compatible with NTPv4, it wouldn't have to change to NTPv5.
>>
>> Where is it written that a v4 EF must be compatible with a v5 packet?
> 
> It's not written anywhere. It will save us a lot of work if we can
> reuse the existing EFs (e.g. NTS) as they are specified for NTPv4.

So go ahead and re-use them, if you want.  Who is stopping you?

Folks here have also said that they expect "separate engines" for v4 and 
v5 packets in their NTP code.  If that's the case, who cares if the EFs 
are the same or if they're different?

>> And if one requires 7822 header lengths for compatibility, great.
>>
>> The reference implementation supports both, but we do not require 7822
>> minimum lengths because they are demonstrably not needed.
> 
> As I understand it, ntpd doesn't support 7822 yet. It is still
> responding to unknown extension fields with a crypto NAK.

Some consider this a bug, some consider this a feature.

I thought implementations had the choice to ignore stuff they didn't 
understand, or drop packets they don't understand.  It's no big stretch 
to return a crypto NAK in this case, too.

In fact, I have found the "crypto NAK on unknown post-base-packet data" 
to be very helpful.

-- 
Harlan Stenn <stenn@nwtime.org>
http://networktimefoundation.org - be a member!