Re: [Ntp] I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt

Ragnar Sundblad <ragge@netnod.se> Thu, 26 March 2020 15:31 UTC

Return-Path: <ragge@netnod.se>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77FD63A0C5A for <ntp@ietfa.amsl.com>; Thu, 26 Mar 2020 08:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=netnod-se.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id X3PqXNZt1kuX for <ntp@ietfa.amsl.com>; Thu, 26 Mar 2020 08:31:53 -0700 (PDT)
Received: from mail-lf1-x133.google.com (mail-lf1-x133.google.com [IPv6:2a00:1450:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E56D03A07E1 for <ntp@ietf.org>; Thu, 26 Mar 2020 08:31:52 -0700 (PDT)
Received: by mail-lf1-x133.google.com with SMTP id v4so5172401lfo.12 for <ntp@ietf.org>; Thu, 26 Mar 2020 08:31:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netnod-se.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZkdzXtFY8VEDI+vN746+SdzopNv4xiDE0qNdBwRFCD0=; b=yKxvbw9R76ZtU6iu6EH6FIiFEUdjpQTHw58QPGYvIK/Gn82mSXpoIJTmOyIQbgX/nC T619SRY0m9uhKQZ+c3ncA2A1YMBp69XgPlbhgXQBhJ6g/4KwxqTtZxJdmYaXL8b/J189 C44j6Rh6NKNhEbrmyUBdUP3LBku1ZC7kk7qkHtmQMjZzQ1561AboUp+SOVLgI4U+z+wl FnbtQzb73q0jIXmxlCBIzjjNmgCZRzEc1QW2O0POxik0vb5AHAJmvkiN6+09k7pIREFz 6KEryniQ9FWaWmKml/SxqzYMOZKDkhLKeScG0js3Dx7ojMUt0DxzNIi2XLc6AjMycMZC DMMw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ZkdzXtFY8VEDI+vN746+SdzopNv4xiDE0qNdBwRFCD0=; b=P8bT50pT1e2x9BOD2oyopwkie2ajOJ6R7jRuloJOzKzLjM5ksyQKmvXFtGFdFIJ1CN mPs9u3onj7qkWInRKZ1rCW5mrAn7XmqfWOHFkR/4p3M74x17WiUFoU+N1BmIPL+jJKbr yx+pSpqIdY2GhgyS4sR3Wxb4QPLCuoBvb8U0AcyMXg8Juy8c0IWzQ1vIsyO2j162gk57 GH2nOJ6pvvgmu5mK9lWrI6jqVIGJDayVH3EbUXx84SkzekoTl0GvlwGSf1tfDNfQ5r/n Ba/HbyrPrfiGpDSUPAV8y5RQkZZ3bg4Ra14me4+zXlZmM4T11cyJfEuRaggy8Hpuw2et ba4g==
X-Gm-Message-State: ANhLgQ2vVPXxZ2NF5/8s7QOJ//dALn8EEXhmxx2Si3eVg57bKp4Zitq2 Qs/S/Nbp94xvrhoB9yqB+sfw4ktLaTtmOQ==
X-Google-Smtp-Source: ADFU+vvENMrObgQyRauuT+BMSF2wz+BcBOIYwrenGa+oHTTX0g7Kx1YHt61aXOTAHf27/yZcBitdnQ==
X-Received: by 2002:a19:ac8:: with SMTP id 191mr6101105lfk.77.1585236710769; Thu, 26 Mar 2020 08:31:50 -0700 (PDT)
Received: from [10.0.1.14] (h-122-211.A530.priv.bahnhof.se. [213.80.122.211]) by smtp.gmail.com with ESMTPSA id x28sm1675308ljd.24.2020.03.26.08.31.49 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 26 Mar 2020 08:31:49 -0700 (PDT)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
From: Ragnar Sundblad <ragge@netnod.se>
In-Reply-To: <20200326140728.884B740605C@ip-64-139-1-69.sjc.megapath.net>
Date: Thu, 26 Mar 2020 16:31:49 +0100
Cc: NTP WG <ntp@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <70D4591D-CFFA-4FE1-9740-A37C33DE2983@netnod.se>
References: <20200326140728.884B740605C@ip-64-139-1-69.sjc.megapath.net>
To: Hal Murray <hmurray@megapathdsl.net>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/jjwIfmEfutEiaKf5OV33tgm5KlU>
Subject: Re: [Ntp] I-D Action: draft-ietf-ntp-using-nts-for-ntp-27.txt
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 26 Mar 2020 15:31:58 -0000


> On 26 Mar 2020, at 15:07, Hal Murray <hmurray@megapathdsl.net> wrote:
> 
> 
> ragge@netnod.se said:
>> They should not fail with a working server, why would they? And if they do,
>> they will very quickly get to long retry intervals, and there is likely
>> something broken with the server anyway. 
> 
> I think you are underestimating the ability of complicated systems to screw up 
> in ways that are not anticipated and/or for people to write and read 
> complicated specs.
> 
> Consider Miroslav's example of TCP working while UDP gets firewalled.  (My 
> code would not be nice in that case, and I'm a nut-case about retrying too 
> hard.  I'll have to think about how to fix that.)  When does the NTS-KE retry 
> timer get reset?

"Clients MUST NOT reset the retry interval until they have performed a
successful key establishment with the NTS-KE server, followed by a
successful use of the negotiated next protocol with the keys and data
established during that transaction.”

So, as I said to Miroslaw, there will be a KE, 8 NTP requests,
increasing retry timer, repeat.

>  How many independent retry timers do we need?

One per NTS-enabled-NTP server.

>  (Do we need 
> another for DNS?)

I don’t think so, but you probably know better than me!

> I think this area is complicated enough that we shouldn't try to over engineer 
> it.  What can we say that will be easy to understand and cover most of cases 
> we can think of today?  Being overly conservative is OK with me.

Have you checked out Section 4.2 in draft v28?
<https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-28#section-4.2>

> Can we list nasty cases?

Do we know of any yet?
But there probably will be, that is one of the at least three reasons
that the draft says:
"The exact workings of this will be dependent on the application and
operational experience gathered over time.  Until such experience
is available, this memo provides the following suggestion.”

> Can we push things like that to some other document 
> that is easier/faster to update?

That would be nice!
Is there anything similar for other protocols?

> Do we want to add something like:
>  This area lacks experience.  Code using NTS-KE MUST NOT be installed in 
> places where it can't or won't be updated.
> 
> ----------
> 
> I got mail saying
> The IESG has approved the following document:
> - 'Network Time Security for the Network Time Protocol'
>  (draft-ietf-ntp-using-nts-for-ntp-28.txt) as Proposed Standard
> 
> Is there any point in discussing things like this?

We likely can’t change the the spec at this time, but again, this
particular issue will likely develop over time.

> Do we get to see a version after the editor fixes the tbds and such yet before 
> it is officially published?

I suppose, I’ll check!

Ragnar