Re: [Ntp] Experimental/Private EF area: was Re: Registries document

Miroslav Lichvar <mlichvar@redhat.com> Tue, 01 August 2023 09:47 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 159FDC15108B for <ntp@ietfa.amsl.com>; Tue, 1 Aug 2023 02:47:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.106
X-Spam-Level:
X-Spam-Status: No, score=-7.106 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8AIja_7wdtFj for <ntp@ietfa.amsl.com>; Tue, 1 Aug 2023 02:47:35 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CAA60C15107F for <ntp@ietf.org>; Tue, 1 Aug 2023 02:47:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1690883254; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=VNEv7nh9kJRbfeEhIs/dkkUstM28YvMz8of4A9AcFU8=; b=Y6mWap2KohRQYtUTRKLCqjH5cFyk32+zPjoWwmHsCcGwB+b8yfBRz6+TpdoMQbF2LGjtZV rqnN8/ltvllNIqlJ//k584UiJPhgIhhMH7SjrWOnNwLSjYisvm6YHHySArSdPsRvHAZTZD 2MeVfNYsQgxH3Za14Cag3kOF+gCWIBo=
Received: from mimecast-mx02.redhat.com (66.187.233.73 [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-255-7cbM0Rz0Pc-s_-VJWTq5Fw-1; Tue, 01 Aug 2023 05:47:32 -0400
X-MC-Unique: 7cbM0Rz0Pc-s_-VJWTq5Fw-1
Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id CA9421C09040; Tue, 1 Aug 2023 09:47:31 +0000 (UTC)
Received: from localhost (unknown [10.43.135.229]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 1B4A840C6CCC; Tue, 1 Aug 2023 09:47:30 +0000 (UTC)
Date: Tue, 01 Aug 2023 11:47:30 +0200
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Harlan Stenn <stenn@ntp.org>
Cc: "Salz, Rich" <rsalz@akamai.com>, Harlan Stenn <stenn@nwtime.org>, "ntp@ietf.org" <ntp@ietf.org>
Message-ID: <ZMjUsiNI9/Fx6N41@localhost>
References: <664a52a9-08a9-d755-7f2c-5e7b9e3c9667@nwtime.org> <72448798-1D9F-4391-B3A6-131CE9783132@akamai.com> <d53b7d81-08bb-9159-33e7-9d0e21cca7d8@ntp.org> <EA171472-63A2-468E-AE6B-D655403058D0@akamai.com> <055e2897-143a-e19c-9c1b-b1953c4ea2c9@ntp.org> <795cbd64-5637-131f-b287-8649a3db145c@ntp.org> <ZMeh8WnbrAKDPx0Z@localhost> <21773363-e898-ed95-35e5-8ebca9efd58d@ntp.org> <ZMit1DBBwFNheq8c@localhost> <839f9b13-e6c2-bfe6-724a-828acc5f6742@ntp.org>
MIME-Version: 1.0
In-Reply-To: <839f9b13-e6c2-bfe6-724a-828acc5f6742@ntp.org>
X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/ZahaIpuxb2K7ei4EzAC8AcAIwg0>
Subject: Re: [Ntp] Experimental/Private EF area: was Re: Registries document
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Aug 2023 09:47:38 -0000

On Tue, Aug 01, 2023 at 01:45:36AM -0700, Harlan Stenn wrote:
> The Autokey change from Type 1 to Type 2 came out in July of 2003.
> 
> draft-ietf-ntp-autokey-00 came out in September of 2007, partway thru the
> period where ntp-4.2.4 was in use.
> 
> I heard plenty from folks who said "don't break backward compatibility".  I
> heard *nothing* about "hey, maybe we should figure out how to make the EF
> code match 5906".

Ok, so why do you want to make the change now?

> But, as I said, I'm going to be working on a document where the V1 EF is
> documented for historical purposes.

Isn't it easier to update RFC5906, when nothing has implemented it?

> The values I chose are very efficient to process in an enterprise-class or
> "carrier grade" implementation.

I don't think there is a measurable impact for an NTP server searching
EF types in a set of 8-bit values instead of 16-bit values, certainly
not in an NTP implementation like ntpd, which is mainly limited by the
OS. Can you demonstrate it? And are you sure this impact is bigger
than the impact of resolving collisions between the ntpd autokey types
and RFC5906?

> > Why would you do that? Such a waste of your project's resources.
> 
> I'm not saying we'd do it for free.

I see. If somebody else is paying for a pointless increase in
the complexity of the code, that makes it ok.

> There are apparently large organizations who, in spite of being told for a
> very long time that Autokey should not be used, still use Autokey because it
> gets them a TAI offset, and "it works just fine for them".

If they need the TAI offset, allow the Autokey LEAP extension field to
be used without the rest of Autokey and protect it by a symmetric key
or NTS. That would be a useful improvement.

> > Let's update the registries to include the ntpd Autokey EF types and
> > move on.
> 
> Please keep the V1 EF table separate from the V2 EF table.

The trouble is that there is only one table. How would an
implementation know which table is a received packet using?

-- 
Miroslav Lichvar