Re: [Ntp] Antw: [EXT] Re: Public NTP servers already responds to NTPv5

"Salz, Rich" <rsalz@akamai.com> Thu, 03 December 2020 16:21 UTC

Return-Path: <rsalz@akamai.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 311503A0E71 for <ntp@ietfa.amsl.com>; Thu, 3 Dec 2020 08:21:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=akamai.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y41vh7DJ5-Vl for <ntp@ietfa.amsl.com>; Thu, 3 Dec 2020 08:21:37 -0800 (PST)
Received: from mx0a-00190b01.pphosted.com (mx0a-00190b01.pphosted.com [IPv6:2620:100:9001:583::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9B8513A0EF3 for <ntp@ietf.org>; Thu, 3 Dec 2020 08:21:37 -0800 (PST)
Received: from pps.filterd (m0122332.ppops.net [127.0.0.1]) by mx0a-00190b01.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 0B3G1HUe006210; Thu, 3 Dec 2020 16:21:36 GMT
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=akamai.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=jan2016.eng; bh=Zr8GeXmkopOutIU427Usu6JogQLKvKh443AZcLTkxqM=; b=MUGINIWzCVbdGYX/9Bsz043PS+Mnlp+vAuXVtnCwBxhuKN8iIwyYmC8ndtJ7c7AGtIdN YCGmhAUg7m+0tqLbJM1NeoWRZ4l5kDCVmo6/AQi598scv0wu0tGv4OpMWEmZ3+hht3Du smSRKArtiqSrO/tBVPtnml24zYOntnDx0IJLA/JRGQx3BhTv2MGDAVUTKhRVSlDZLTqG fWnhs8qTW12DDs8fbbUUAByBBzk0P50aYBdppcDGbsySF2blMIegstkRZVeWiWvUr0ZO +i6kySABiVvbHHbJ5HoNCrdc0HCCSbF8OdnEb9QU3L5RRomHc2JBmDAD3N4by+XmnqEC Yw==
Received: from prod-mail-ppoint7 (a72-247-45-33.deploy.static.akamaitechnologies.com [72.247.45.33] (may be forged)) by mx0a-00190b01.pphosted.com with ESMTP id 355v3tem91-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 03 Dec 2020 16:21:36 +0000
Received: from pps.filterd (prod-mail-ppoint7.akamai.com [127.0.0.1]) by prod-mail-ppoint7.akamai.com (8.16.0.42/8.16.0.42) with SMTP id 0B3G6gpG016329; Thu, 3 Dec 2020 11:21:35 -0500
Received: from email.msg.corp.akamai.com ([172.27.123.53]) by prod-mail-ppoint7.akamai.com with ESMTP id 353js3crn6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 03 Dec 2020 11:21:35 -0500
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com (172.27.123.101) by usma1ex-dag1mb2.msg.corp.akamai.com (172.27.123.102) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 3 Dec 2020 11:21:34 -0500
Received: from USMA1EX-DAG1MB1.msg.corp.akamai.com ([172.27.123.101]) by usma1ex-dag1mb1.msg.corp.akamai.com ([172.27.123.101]) with mapi id 15.00.1497.008; Thu, 3 Dec 2020 11:21:34 -0500
From: "Salz, Rich" <rsalz@akamai.com>
To: Hal Murray <hmurray@megapathdsl.net>, Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
CC: "ntp@ietf.org" <ntp@ietf.org>, "stenn@nwtime.org" <stenn@nwtime.org>
Thread-Topic: [Ntp] Antw: [EXT] Re: Public NTP servers already responds to NTPv5
Thread-Index: AQHWyUyh8O7MlD/H1Umfarpk5AwR56nljiIA
Date: Thu, 03 Dec 2020 16:21:33 +0000
Message-ID: <F59763D2-0389-4118-B4EC-66510624F1BA@akamai.com>
References: <Ulrich.Windl@rz.uni-regensburg.de> <5FC89964020000A10003D3DF@gwsmtp.uni-regensburg.de> <20201203081642.E1DAF40605C@ip-64-139-1-69.sjc.megapath.net>
In-Reply-To: <20201203081642.E1DAF40605C@ip-64-139-1-69.sjc.megapath.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.43.20110804
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [172.27.164.43]
Content-Type: text/plain; charset="utf-8"
Content-ID: <55A667A299DC3A4592DF35ECA4A28CEC@akamai.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312, 18.0.737 definitions=2020-12-03_09:2020-12-03, 2020-12-03 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 malwarescore=0 bulkscore=0 suspectscore=0 mlxscore=0 spamscore=0 phishscore=0 mlxlogscore=796 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2012030096
X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312, 18.0.737 definitions=2020-12-03_08:2020-12-03, 2020-12-03 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 adultscore=0 spamscore=0 suspectscore=0 impostorscore=0 bulkscore=0 priorityscore=1501 phishscore=0 clxscore=1011 lowpriorityscore=0 mlxscore=0 mlxlogscore=706 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2012030096
X-Agari-Authentication-Results: mx.akamai.com; spf=${SPFResult} (sender IP is 72.247.45.33) smtp.mailfrom=rsalz@akamai.com smtp.helo=prod-mail-ppoint7
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/fHoWIeN2tEevaZRKVGU3rpqifjs>
Subject: Re: [Ntp] Antw: [EXT] Re: Public NTP servers already responds to NTPv5
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Dec 2020 16:21:39 -0000

>    That doesn't effect the on-the-wire protocol.

It might.  If it turns out (as happened with TLS 1.3), you have to make NTPv5 look like NTPv4 so that packets aren't blocked, you'll want to put the extra information into the extensions area.