Re: [Ntp] ntp over ptp

Miroslav Lichvar <mlichvar@redhat.com> Wed, 13 March 2024 08:01 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DF088C18DBA0 for <ntp@ietfa.amsl.com>; Wed, 13 Mar 2024 01:01:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.108
X-Spam-Level:
X-Spam-Status: No, score=-2.108 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eH0ZdGabxzfi for <ntp@ietfa.amsl.com>; Wed, 13 Mar 2024 01:01:37 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 509E1C18DB9F for <ntp@ietf.org>; Wed, 13 Mar 2024 01:01:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1710316895; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=C42oN6yBNss06Ou1MGtKnLLoGgWMC5gxhyEPeyz1oP8=; b=h64MNQHd2bVnoISUb3lXOkHNszb7UyCU2wJHoPVkcQjPlhLdrb6irQrG2lH/azfu6M2Bq8 SmaohLPbyondH5soRRjxNSFLP3RtTXpwUoE6/MeI+3ssbFWdLFPSE5Y+QrcQ/H/buQ8rgh z13pjvWLVH0QwsO7eAOCme0CJrnYX3Y=
Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-691-vDdhdD1mP22wec--W7gptg-1; Wed, 13 Mar 2024 04:01:32 -0400
X-MC-Unique: vDdhdD1mP22wec--W7gptg-1
Received: from smtp.corp.redhat.com (int-mx07.intmail.prod.int.rdu2.redhat.com [10.11.54.7]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2A1823C000B3; Wed, 13 Mar 2024 08:01:32 +0000 (UTC)
Received: from localhost (unknown [10.43.135.229]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 8ADF61C060A4; Wed, 13 Mar 2024 08:01:31 +0000 (UTC)
Date: Wed, 13 Mar 2024 09:01:30 +0100
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Doug Arnold <doug.arnold@meinberg-usa.com>
Cc: NTP WG <ntp@ietf.org>, Rodney Cummings <rodney_cummings_spm@hotmail.com>
Message-ID: <ZfFdWpvCjxTGfwia@localhost>
References: <AM7PR02MB5765C06778AC58E3B1AFC281CF242@AM7PR02MB5765.eurprd02.prod.outlook.com> <ZfB4K72uzmhsTsW5@localhost> <AM7PR02MB57656F107CB59C73484BCB33CF2B2@AM7PR02MB5765.eurprd02.prod.outlook.com>
MIME-Version: 1.0
In-Reply-To: <AM7PR02MB57656F107CB59C73484BCB33CF2B2@AM7PR02MB5765.eurprd02.prod.outlook.com>
X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.7
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/gADsEtm4i-DkSBAfu0-1Ys1wb2Q>
Subject: Re: [Ntp] ntp over ptp
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 13 Mar 2024 08:01:38 -0000

On Tue, Mar 12, 2024 at 09:05:30PM +0000, Doug Arnold wrote:
> Now that there is a fair number of switches and routers that support PTP, several standards organizations have specified or proposed specifications for timing protocols that use PTP messages, including the PTP reserved EtherType, for new timing protocols that are not PTP.  The IEEE 1588 Working Group has had several discussions about this and there is a great deal of concern that the behavior of PTP capable equipment receiving messages from quasi PTP protocols is uncertain, and therefore makes PTP less reliable.

You mean there could be bugs in PTP switches/routers that would be
triggered by NTP-over-PTP or similar protocols, but not regular PTP?
Can you describe an example of how would that happen?

I think it would be best if there was an additional layer between PTP
and UDP or other transports used specifically only for triggering
hardware timestamping and making transparent delay corrections, so it
could be used by different protocols like PTP and NTP.

I suspect it's too late to do anything about that. When PTP was
originally designed I guess nobody expected it would be used in
computer networks, but here we are. Existing hardware cannot be
changed and future hardware supporting multiple protocols seems
unlikely. The logic in the hardware timestamping path needs to be as
simple as possible to be able to run at increasing network speeds. 

> I have no objection to people defining new timing protocols, or to people copying aspects of PTP, but they should not use the reserved PTP EtherType in their new protocol.  The EtherType is the one thing that PTP implementations should be able to count on.

Are you suggesting we limit NTP over PTP to the following two
transports?
- NTP over PTP over UDP over IPv4
- NTP over PTP over UDP over IPv6

Currently as it is written it allows any transport that supports
unicast messaging. I wouldn't expect much interest in non-IP
transports like NTP over PTP over Ethernet or DeviceNet or ControlNet.

-- 
Miroslav Lichvar