Re: [Ntp] NTPv5: big picture

Philip Prindeville <philipp@redfish-solutions.com> Mon, 04 January 2021 17:40 UTC

Return-Path: <philipp@redfish-solutions.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 058013A0EBC for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 09:40:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.013
X-Spam-Level:
X-Spam-Status: No, score=0.013 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MxBOlfIBSXiE for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 09:40:14 -0800 (PST)
Received: from mail.redfish-solutions.com (mail.redfish-solutions.com [45.33.216.244]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D9B63A0EB9 for <ntp@ietf.org>; Mon, 4 Jan 2021 09:40:14 -0800 (PST)
Received: from [192.168.3.4] ([192.168.3.4]) (authenticated bits=0) by mail.redfish-solutions.com (8.16.1/8.16.1) with ESMTPSA id 104HeDA2347628 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 4 Jan 2021 10:40:14 -0700
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.40.0.2.32\))
From: Philip Prindeville <philipp@redfish-solutions.com>
In-Reply-To: <20210104151813.GB2992437@localhost>
Date: Mon, 04 Jan 2021 10:40:13 -0700
Cc: Hal Murray <hmurray@megapathdsl.net>, NTP WG <ntp@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <301BACA8-EFA2-4588-81B1-B39CD977298E@redfish-solutions.com>
References: <20210101025440.ECE3340605C@ip-64-139-1-69.sjc.megapath.net> <20210104151813.GB2992437@localhost>
To: Miroslav Lichvar <mlichvar@redhat.com>
X-Mailer: Apple Mail (2.3654.40.0.2.32)
X-Scanned-By: MIMEDefang 2.84 on 192.168.1.3
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/j-1v8TNFi-fd68SEGHeiTBNoZXI>
Subject: Re: [Ntp] NTPv5: big picture
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jan 2021 17:40:20 -0000


> On Jan 4, 2021, at 8:18 AM, Miroslav Lichvar <mlichvar@redhat.com> wrote:
> 
> On Thu, Dec 31, 2020 at 06:54:40PM -0800, Hal Murray wrote:
>> 
>> Do we have a unifying theme?  Can you describe why we are working on NTPv5 in 
>> one sentence?
> 
> There is a list of issues in NTPv4 I would like to see fixed in NTPv5:
> https://trac.ietf.org/trac/ntp/wiki/NtpVersionFourIssues
> 
> A major issue is that NTPv4 doesn't support short extension fields due
> to conflicts with legacy MACs, so fixing all those issues by adding
> new extending fields to NTPv4 seems impractical. Some things, e.g. the
> timescale selection, makes more sense to have in the header.
> 
>> Part of the motivation for this is to enable and encourage OSes to convert to 
>> non-leaping time in the kernels.  Are there any subtle details in this area 
>> that we should be aware of?  Who should we coordinate with?  ...
> 
> I don't think that should be the job of the NTP WG. The kernels will
> need to support a leaping UTC timescale for as long as it is needed
> for civil time.


I disagree.  The kernel doesn’t inherently require UTC.  It could just as easily use TAI or some other format.

The kernel needs to provide into user-space some format which is then convertible to UTC, for as long as UTC is in-use by applications.

This could be handled by libc.

-Philip


> 
> NTP should keep support for the existing use cases. It is a protocol
> for exchanging timestamps. The client and server need to agree on the
> timescale. If both have support for TAI, that's great. They can use it
> to avoid ambiguous timestamps around leap seconds. But this shouldn't
> be a requirement. NTP needs to support UTC and it needs to announce
> leap seconds before they happen. Forcing some servers or clients to
> implement an unreliable TAI clock on top of an UTC clock only to make
> NTP slightly simpler is not a good idea.
> 
>> ---------
>> 
>> I think this would bring out another important area: How does a client 
>> discover if a server supports an option and/or discover servers that do 
>> support it?
> 
> With most options I think the client can simply send a request using
> that option and see if the server's response has it. It can do that
> with every request, or try it only occasionally to reduce the average
> length of the request and response.
> 
> For more complex or conflicting features, the support can be indicated
> with a flag in an extension field.
> 
> -- 
> Miroslav Lichvar
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org
> https://www.ietf.org/mailman/listinfo/ntp