Re: [Ntp] Symmetric mode

Hal Murray <halmurray@sonic.net> Thu, 29 September 2022 09:45 UTC

Return-Path: <halmurray@sonic.net>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AADAC14CE33 for <ntp@ietfa.amsl.com>; Thu, 29 Sep 2022 02:45:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.606
X-Spam-Level:
X-Spam-Status: No, score=-2.606 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 633Jt6Lg7z-i for <ntp@ietfa.amsl.com>; Thu, 29 Sep 2022 02:45:26 -0700 (PDT)
Received: from d.mail.sonic.net (d.mail.sonic.net [64.142.111.50]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3061C14CE27 for <ntp@ietf.org>; Thu, 29 Sep 2022 02:45:26 -0700 (PDT)
Received: from 107-137-68-211.lightspeed.sntcca.sbcglobal.net (107-137-68-211.lightspeed.sntcca.sbcglobal.net [107.137.68.211]) (authenticated bits=0) by d.mail.sonic.net (8.16.1/8.16.1) with ESMTPSA id 28T9jPSX006275 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT); Thu, 29 Sep 2022 02:45:25 -0700
Received: from hgm (localhost [IPv6:::1]) by 107-137-68-211.lightspeed.sntcca.sbcglobal.net (Postfix) with ESMTP id DCB1828C1D8; Thu, 29 Sep 2022 02:45:24 -0700 (PDT)
X-Mailer: exmh version 2.9.0 11/07/2018 with nmh-1.7.1
To: Danny Mayer <mayer@pdmconsulting.net>
cc: Hal Murray <halmurray@sonic.net>, "ntp@ietf.org" <ntp@ietf.org>
From: Hal Murray <halmurray@sonic.net>
In-Reply-To: Message from Danny Mayer <mayer@pdmconsulting.net> of "Wed, 28 Sep 2022 19:33:46 -0400." <e15fb43b-9c28-7a13-b395-468e8c62b71a@pdmconsulting.net>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Date: Thu, 29 Sep 2022 02:45:24 -0700
Message-Id: <20220929094524.DCB1828C1D8@107-137-68-211.lightspeed.sntcca.sbcglobal.net>
X-Sonic-CAuth: UmFuZG9tSVaJhLFl9/+05rtLnJ89eIBMuHLnRtb9CIHns0WwEP/i6eUMNIoDuoHFd97fhCDBWUMKh32z791wvZogKtgnYw8sQ1t82feAAuY=
X-Sonic-ID: C;cqVdcds/7RGex5ArP63e0g== M;9GOLcds/7RGex5ArP63e0g==
X-Sonic-Spam-Details: -1.5/5.0 by cerberusd
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/gdwLsQwViSklwXVNcAsHH3Gobto>
Subject: Re: [Ntp] Symmetric mode
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Sep 2022 09:45:30 -0000

mayer@pdmconsulting.net said:
> I realized over the weekend that people have misunderstood how symmetric
> mode works and think that there is just one packet exchange between  peers.
> That is incorrect. That's not how it works.

> Symmetric mode works almost identically to client/server modes on the  wire.
> The only difference is that client/server use modes 3 and 4 while  symmetric
> peer use mode 1 or 2 depending on whether these are active or  passive modes.
> You should see no difference on the wire between  client/server and symmetric
> modes except for the mode value. 

 From https://doc.ntp.org/documentation/4.2.8-series/assoc/
> A symmetric active peer sends a symmetric active (mode 1) message to a
> designated peer. If a matching configured symmetric active association is
> found, the designated peer returns a symmetric active message. If no matching
> association is found, the designated peer mobilizes a ephemeral symmetric
> passive association and returns a symmetric passive (mode 2) message. Since
> an intruder can impersonate a symmetric active peer and cause a spurious
> symmetric passive association to be mobilized, symmetric passive mode should
> always be cryptographically validated.

I setup a test case using ntpd 4.3.99

If both sides peer each other, I see symmetric active going both ways at the 
polling interval with no immediate response.  ntpq -p shows happiness but the 
bottom bit of reach is often not set.  This is the half-bandwidth case I was 
expecting.

If one side says "peer other" and the other side doesn't say anything I get 
the symmetric active/passive pair you describe.

I was expecting an ephemeral slot to show up in ntpq -p but I haven't seen it. 
Maybe I haven't got the restrict stuff right.  I tried
  restrict default notrap
with all other restrict stuff commented out.  Can anybody confirm that this 
ephemeral association does or doesn't show up in ntpq -p?  Is crypto now 
required?  ???



-- 
These are my opinions.  I hate spam.