[Ntp] Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Mon, 18 October 2021 05:49 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AB7743A11A7 for <ntp@ietfa.amsl.com>; Sun, 17 Oct 2021 22:49:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1Fq2a3Q8pE8O for <ntp@ietfa.amsl.com>; Sun, 17 Oct 2021 22:49:26 -0700 (PDT)
Received: from mx1.uni-regensburg.de (mx1.uni-regensburg.de [194.94.157.146]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 299403A11A6 for <ntp@ietf.org>; Sun, 17 Oct 2021 22:49:24 -0700 (PDT)
Received: from mx1.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 5CBB36000052 for <ntp@ietf.org>; Mon, 18 Oct 2021 07:49:19 +0200 (CEST)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx1.uni-regensburg.de (Postfix) with ESMTP id 2F0216000050 for <ntp@ietf.org>; Mon, 18 Oct 2021 07:49:16 +0200 (CEST)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Mon, 18 Oct 2021 07:49:16 +0200
Message-Id: <616D0ADA020000A10004486B@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.3.1
Date: Mon, 18 Oct 2021 07:49:14 +0200
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: doug.arnold=40meinberg-usa.com@dmarc.ietf.org, james.ietf@gmail.com
Cc: "ntp@ietf.org" <ntp@ietf.org>
References: <163386015957.12424.6997038478834885480@ietfa.amsl.com> <CAO+dDx=6baLhf9LwSMvR1F0ieuLO6NXmExYLDvcCF2tgchHs8w@mail.gmail.com> <DB8PR02MB5772AC97BFE2D7C1139EFDC0CFB89@DB8PR02MB5772.eurprd02.prod.outlook.com> <E469D9A7-7445-49D9-A8A2-82BA7BF1FA27@gmail.com> <DB8PR02MB57726795E3AD479F0CCFA778CFB99@DB8PR02MB5772.eurprd02.prod.outlook.com>
In-Reply-To: <DB8PR02MB57726795E3AD479F0CCFA778CFB99@DB8PR02MB5772.eurprd02.prod.outlook.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/g4n5vbtn7kuNn_C8GJTVN8QF5gc>
Subject: [Ntp] Antw: [EXT] Re: New Version Notification for draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Oct 2021 05:49:33 -0000

>>> Doug Arnold <doug.arnold=40meinberg-usa.com@dmarc.ietf.org> schrieb am
15.10.2021 um 17:53 in Nachricht
<DB8PR02MB57726795E3AD479F0CCFA778CFB99@DB8PR02MB5772.eurprd02.prod.outlook.com>

> Hello James,
> 
> I agree that leap smearing is a clumsy and dangerous way to avoid the 
> complication of correctly handling leap seconds in distributed database 
> software.  And if it was up to me all IT equipment would use TAI for all 
> timing except what is displayed to humans.  But it is not up to me.  The 
> people who are making the call tell me that they believe that leap seconds
is 
> less bad than either moving everything from UTC to TAI, or writing and 
> debugging database software that manages leap seconds properly.
> 
> So given that state of affairs.  What do we do?

Hi!

I guess the standard C library needs new functions to get the correct time
first ;-)
time_t has a problem.

Amazingly gettimeofday can use struct timezone, while clock_gettime() can't.
So adding the TAI offset to struct timezone would not help much.

Regards,
Ulrich

> 
> Doug
> 
> From: James <james.ietf@gmail.com>
> Date: Friday, October 15, 2021 at 5:27 AM
> To: Doug Arnold <doug.arnold@meinberg‑usa.com>
> Cc: NTP WG <ntp@ietf.org>
> Subject: Re: [Ntp] New Version Notification for 
> draft‑gruessing‑ntp‑ntpv5‑requirements‑03.txt
> Doug,
> Thanks for the feedback, responses inline.
> 
> 
> On 15 Oct 2021, at 00:45, Doug Arnold 
> <doug.arnold@meinberg‑usa.com<mailto:doug.arnold@meinberg‑usa.com>> wrote:
> 
> Thanks James,
> 
> I think that this is pretty close to what is needed for ntpv5.  I like the 
> separation of protocol and algorithms, and the use of monotonic timescale
for 
> timestamp fields (at least by default), and the insistence on security.
> 
> I have two comments:
> 1. Why do you think that encryption should be the default mode? People often

> consider timing information to be critical but not secret.  Also it is
likely 
> to affect accuracy in implementations by adding a variable delay to
encrypt.
> 
> We’ve had a few discussions on list on the subject in the past, and the 
> draft says:
> 
>> Encryption and authentication MUST be provided by the protocol
specification 
> as a default and MUST be resistant to downgrade attacks...
> 
> To put this another way, I think the specification must provide 
> confidentiality as well as authentication, and that if either is applied
they 
> cannot be removed from a connection (aka a security downgrade) which makes 
> authentication the minimum and doesn’t necessarily mandate confidentiality.
> 
> This section in particular could probably use some editing and clarification

> to better explain this [1] as we’ll likely need consensus calls made.
> 
> 
> 2. I think that it is better to allow leap smearing and make it a visible 
> part of the protocol than to pretend it is not going to happen.  On this 
> topic I think that Miroslav’s proposal was more realistic.  Data center 
> network architects tell me they definitely plan to continue to do leap 
> smearing.
> 
> In other use cases such as publicly accessible NTP, leap smearing has 
> effectively fragmented the pools of services a given host can use as mixing

> smeared and non‑smeared services is not a good idea, in addition to the 
> start/end and cadence of smearing being inconsistent between providers [2].
I 
> think that having a “linear, monotonic timescale” and leap smearing together

> are contradictory and so having smearing in the wire format would requiring

> changing that. My proposal doesn’t prevent smearing of a clock being 
> synchronised, it’s about removing the smear from the wire.
> 
> ‑ J
> 
> 1: 
>
https://github.com/fiestajetsam/draft‑gruessing‑ntp‑ntpv5‑requirements/issues/

> 4
> 2: https://mailarchive.ietf.org/arch/msg/ntp/hJTpPJ1L5bzBPhLtiQzL3bk75LM/