[Ntp] Antw: Re: Antw: Re: Antw: Re: Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Fri, 22 October 2021 12:33 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94B783A0C5A for <ntp@ietfa.amsl.com>; Fri, 22 Oct 2021 05:33:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hZ3WyPaJL32t for <ntp@ietfa.amsl.com>; Fri, 22 Oct 2021 05:33:00 -0700 (PDT)
Received: from mx3.uni-regensburg.de (mx3.uni-regensburg.de [IPv6:2001:638:a05:137:165:0:4:4e79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2EA883A0C55 for <ntp@ietf.org>; Fri, 22 Oct 2021 05:32:59 -0700 (PDT)
Received: from mx3.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id A5455600004F for <ntp@ietf.org>; Fri, 22 Oct 2021 14:32:53 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx3.uni-regensburg.de (Postfix) with ESMTP id E3623600004A for <ntp@ietf.org>; Fri, 22 Oct 2021 14:32:51 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Fri, 22 Oct 2021 14:32:51 +0200
Message-Id: <6172AF72020000A100044C1C@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.3.1
Date: Fri, 22 Oct 2021 14:32:50 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: doug.arnold=40meinberg-usa.com@dmarc.ietf.org, martin.burnicki=40meinberg.de@dmarc.ietf.org, mayer@pdmconsulting.net, mlichvar@redhat.com, halmurray+ietf@sonic.net
Cc: "ntp@ietf.org" <ntp@ietf.org>
References: <D19C98F0020000AAAB822621@gwsmtp.uni-regensburg.de> <B6193D9D02000051AB59E961@gwsmtp.uni-regensburg.de> <84735FB40200007C44DF974D@gwsmtp.uni-regensburg.de> <236983740200003E824A10E1@gwsmtp.uni-regensburg.de> <CEFD0B92020000436A6A8CFC@gwsmtp.uni-regensburg.de> <616E7B69020000A10004491E@gwsmtp.uni-regensburg.de> <DB577C29020000EF6A6A8CFC@gwsmtp.uni-regensburg.de> <616E933D020000A100044957@gwsmtp.uni-regensburg.de> <72083C72020000E06A6A8CFC@gwsmtp.uni-regensburg.de> <D11527C602000032FDA5B133@gwsmtp.uni-regensburg.de> <9E2EA18B020000B86A6A8CFC@gwsmtp.uni-regensburg.de> <6EFADD85020000BDFDA5B133@gwsmtp.uni-regensburg.de> <61714B21020000A100044B83@gwsmtp.uni-regensburg.de> <AM7PR02MB576513760641C35EB5B43673CFBF9@AM7PR02MB5765.eurprd02.prod.outlook.com> <61727020020000A100044BE7@gwsmtp.uni-regensburg.de> <c1e5ade3-2693-c684-66de-0c306036dc1e@meinberg.de> <cc5fb67c-a2a8-1f18-37a7-c79a80326ed2@pdmconsulting.net>
In-Reply-To: <cc5fb67c-a2a8-1f18-37a7-c79a80326ed2@pdmconsulting.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/f4xTgXwtTqQgQ_n1MlBIEGnLnso>
Subject: [Ntp] Antw: Re: Antw: Re: Antw: Re: Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 22 Oct 2021 12:33:06 -0000

>>> Danny Mayer <mayer@pdmconsulting.net> schrieb am 22.10.2021 um 13:43 in
Nachricht <cc5fb67c-a2a8-1f18-37a7-c79a80326ed2@pdmconsulting.net>:

> On 10/22/21 6:00 AM, Martin Burnicki wrote:
>> Am 22.10.21 um 10:02 schrieb Ulrich Windl:
>>>>>> Doug Arnold <doug.arnold=40meinberg-usa.com@dmarc.ietf.org> 
>>>>>> schrieb am
>>> 21.10.2021 um 15:36 in Nachricht
>>> 
><AM7PR02MB576513760641C35EB5B43673CFBF9@AM7PR02MB5765.eurprd02.prod.outlook.co 
> m> 
>>>
>>>
>>>> One thing to keep in mind is that the use case for leap smearing is 
>>>> that it
>>>> happens in a private network, where all Stratum 1 servers are 
>>>> configured the
>>>> same.  I still consider it dangerous, though.
>>
>> I fully agree. Smearing is just a hack to circumvent limitations of 
>> the underlying time synchronization, and avoid even worse problem that 
>> would occur without smearing.
>>
>> The main problem is with applications that get confused when the 
>> system time (UTC, or a local time derived from it) unexpectedly steps 
>> back by 1 second if a leap second is introduced.
>>
>> In my opinion it doesn't really help if the system clock runs on TAI 
>> because unless applications have explicitly designed to take care of 
>> leap seconds would still request UTC or local time from the operating 
>> system, and thus would observe the same, unexpected time step back if 
>> the kernel clock runs TAI and adds the TAI/UTC offset in the reply to 
>> the query.
>>
>> The only ways to avoid the problems would be to either abolish leap 
>> seconds, or fix all applications to work with TAI and convert to UTC 
>> or local time themselves, or to be aware the time steps back due to a 
>> leap second are a normal case that needs to be handled, similar as the 
>> local time step back at the end of DST.
>>
>>> We could demand that a smearing server may only respond to 
>>> authenticated packets (maybe even specific keys), so clients 
>>> expecting leap smear would have to provide some cryptographic key to 
>>> the server.
>>> A clients querying the server by mistake wuld not get a response then.
>>
>> No. Exactly the other way round. Smearing is to hide the leap second 
>> from downstream nodes, even from dumb clients.
>>
>> As I've tried to point out earlier, in any case it's the task of an 
>> administrator to ensure a proper configuration:
>>
>> - If there are smearing and not-smearing servers, he has to configure 
>> which clients should query the time from which servers.
>>
>> - If the clients should do the smearing, he had to configure each 
>> individual client whether to smear, or not.
>>
>> - If a smearing server would only reply to authenticated requests, he 
>> had to configure on each client which server(s) to use, and which 
>> keys, and it wouldn't even be possible to hide the leap second from 
>> dumb clients.
>>
> You also need to worry about the cascading effects of a server accepting 
> smeared time turning around a sending out smeared timestamps in response 
> to requests from downstream clients. Smearing cannot be considered in 
> isolation.

That's what my original point was about.

Ulrich

> 
> Danny