[Ntp] Antw: [EXT] Re: I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt

Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de> Fri, 27 March 2020 07:33 UTC

Return-Path: <Ulrich.Windl@rz.uni-regensburg.de>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E1863A0365 for <ntp@ietfa.amsl.com>; Fri, 27 Mar 2020 00:33:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 22EKcg0OnXi8 for <ntp@ietfa.amsl.com>; Fri, 27 Mar 2020 00:33:23 -0700 (PDT)
Received: from mx3.uni-regensburg.de (mx3.uni-regensburg.de [IPv6:2001:638:a05:137:165:0:4:4e79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E8633A010D for <ntp@ietf.org>; Fri, 27 Mar 2020 00:33:23 -0700 (PDT)
Received: from mx3.uni-regensburg.de (localhost [127.0.0.1]) by localhost (Postfix) with SMTP id 94070600004F for <ntp@ietf.org>; Fri, 27 Mar 2020 08:33:20 +0100 (CET)
Received: from gwsmtp.uni-regensburg.de (gwsmtp1.uni-regensburg.de [132.199.5.51]) by mx3.uni-regensburg.de (Postfix) with ESMTP id 7BFFA600004D for <ntp@ietf.org>; Fri, 27 Mar 2020 08:33:20 +0100 (CET)
Received: from uni-regensburg-smtp1-MTA by gwsmtp.uni-regensburg.de with Novell_GroupWise; Fri, 27 Mar 2020 08:33:19 +0100
Message-Id: <5E7DAC3D020000A100037F73@gwsmtp.uni-regensburg.de>
X-Mailer: Novell GroupWise Internet Agent 18.2.1
Date: Fri, 27 Mar 2020 08:33:17 +0100
From: Ulrich Windl <Ulrich.Windl@rz.uni-regensburg.de>
To: "ntp@ietf.org" <ntp@ietf.org>, mlichvar@redhat.com
References: <158507294813.11622.18159158243943940302@ietfa.amsl.com> <20200325115834.GC25803@localhost> <74B1B8F5-5762-4AB1-B3F2-D5AC2BC325C1@netnod.se> <20200325145956.GF25803@localhost> <400E7210-ABB7-48F7-B52D-A69A96968255@netnod.se> <20200326095602.GB9039@localhost> <842BEA8F-35F7-41B7-8FEC-30515F88A60D@netnod.se> <20200326113745.GC9039@localhost> <97BDCE6D-205D-4727-A585-602AD141B245@netnod.se> <5022_1585231330_5E7CB5E2_5022_507_1_20200326140143.GD9039@localhost>
In-Reply-To: <5022_1585231330_5E7CB5E2_5022_507_1_20200326140143.GD9039@localhost>
Mime-Version: 1.0
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 8bit
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/jDm0HdLWctX7-GWxnrMrSAreVO0>
Subject: [Ntp] Antw: [EXT] Re: I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Mar 2020 07:33:25 -0000

>>> Miroslav Lichvar <mlichvar@redhat.com> schrieb am 26.03.2020 um 15:01 in
Nachricht
<5022_1585231330_5E7CB5E2_5022_507_1_20200326140143.GD9039@localhost>:
> On Thu, Mar 26, 2020 at 02:01:16PM +0100, Ragnar Sundblad wrote:
>> Oh, so you think there is a risk that both the KE negotiation works
>> and at least one NTP requests works, and soon thereafter the
>> connection breaks, frequently?
>> I am not sure why that would happen very often, but if it did, there
>> Should at least be 8 NTP requests (until the client has exhausted its
>> cookies) until it contacts the KE server again.
> 
> Rate limiting of NTP packets in some networks is a major issue, which

Maybe the next NTP specification should talk about the QoS bits.

> was discussed on this list. I sometimes see over 90% packet loss. The
> client would need to reuse cookies to operate reasonably well in such
> conditions. I agree the 8 polling intervals from NTP helps here
> (assuming the interval is not reset to the minimum after NTS-KE and
> it's not using a burst).
> 
>> > No, clients may switch between servers when they become unreachable
>> > (e.g. due to rate limiting). I see this often with my mini-pool of NTS
>> > servers.
>> 
>> Oh really, I didn’t know. So chrony does that? (Nice!)
> 
> I think most NTP and SNTP clients do that.

Specifically Manycast and Pool configurations work like that.

> 
>> > Well, as I said above, there are many reasons why NTS-KE or NTS-NTP
>> > may be consistently failing. For example, an ISP may have a firewall
>> > that blocks large NTP packets. NTS-KE will work as expected, but
>> > no NTS-NTP reply will be ever received, so the clients will be
>> > constantly restarting NTS-KE. If the clients were restarted once per
>> > day and used the 1024*2^(n - 1) retry interval I suggested, the number
>> > of NTS-KE requests would drop to 30%.
>> 
>> Ok - in this case too, there should be 8 NTP requests before it contacts
>> the KE server again, and it will increase the retry interval each time
>> since it has not completed a full cycle of getting cookies and succeeded
>> in using them.
> 
> You are right. Good point. Maybe a bug or incompatibility between
> different implementations would be a better example.
> 
> -- 
> Miroslav Lichvar
> 
> _______________________________________________
> ntp mailing list
> ntp@ietf.org 
> https://www.ietf.org/mailman/listinfo/ntp