Re: [Ntp] Consensus call: NTPv5 and leap second smearing

Paul Gear <ntp@libertysys.com.au> Thu, 29 June 2023 00:54 UTC

Return-Path: <ntp@libertysys.com.au>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28BAEC14CF05 for <ntp@ietfa.amsl.com>; Wed, 28 Jun 2023 17:54:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.094
X-Spam-Level:
X-Spam-Status: No, score=-2.094 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=libertysys.com.au
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N5M3cw8vS-xu for <ntp@ietfa.amsl.com>; Wed, 28 Jun 2023 17:53:58 -0700 (PDT)
Received: from mail.libertysys.com.au (eth821.qld.adsl.internode.on.net [150.101.186.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 883E9C14CE38 for <ntp@ietf.org>; Wed, 28 Jun 2023 17:53:56 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mail.libertysys.com.au (Postfix) with ESMTP id 4867130061F for <ntp@ietf.org>; Thu, 29 Jun 2023 10:53:52 +1000 (AEST)
X-Virus-Scanned: Debian amavisd-new at mail.libertysys.com.au
Received: from mail.libertysys.com.au ([150.101.186.52]) by localhost (mail.libertysys.com.au [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5c5e9LLVhjkk for <ntp@ietf.org>; Thu, 29 Jun 2023 10:53:47 +1000 (AEST)
Received: from [IPV6:2001:44b8:2100:3f40:3fc3:8f17:f88a:63be] (unknown [IPv6:2001:44b8:2100:3f40:3fc3:8f17:f88a:63be]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mail.libertysys.com.au (Postfix) with ESMTPSA id 7C91A300379 for <ntp@ietf.org>; Thu, 29 Jun 2023 10:53:47 +1000 (AEST)
Authentication-Results: mail.libertysys.com.au; dmarc=fail (p=quarantine dis=none) header.from=libertysys.com.au
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=libertysys.com.au; s=2016; t=1688000027; bh=+LaktsOJtFSpN5tR4exrZXtTYGrlJ9fyti1ty+2ZgUI=; h=Date:Subject:To:References:From:In-Reply-To:From; b=RDaup1BwfaAq5vqzczJbTFJrQJkhZnj1vCiz04i2eYnZjnAQkdN0qAmTDhvcLpk9H vMU232ZuGtQgEzMTwYNIY/WD1uRaxglAeXbpYyY3cAsKQYs8vebC38EvpOJPCej0fF R18waJZKRR52ltTITZAF5jtZAdvIs9A21thrZLug=
Content-Type: multipart/alternative; boundary="------------vV9ishNCtDhgexQq2JcCYC2c"
Message-ID: <a8671454-775c-014b-12df-66dffbe01e39@libertysys.com.au>
Date: Thu, 29 Jun 2023 10:53:47 +1000
MIME-Version: 1.0
To: ntp@ietf.org
References: <29343948-036E-4514-8B42-689C19A61813@gmail.com>
Content-Language: en-AU
From: Paul Gear <ntp@libertysys.com.au>
In-Reply-To: <29343948-036E-4514-8B42-689C19A61813@gmail.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/tGqgaeXI8_-i0WuQ5TJiu33P-7o>
Subject: Re: [Ntp] Consensus call: NTPv5 and leap second smearing
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Jun 2023 00:54:02 -0000

On 29/6/23 05:55, Dieter Sibold wrote:
> Dear all,
>
> at IETF 116 we decided to have two consensus calls regarding the content of the NTPv5 requirement draft. These are consensus calls that we would like to conduct to help progress the NTPv5 requirements document (https://datatracker.ietf.org/doc/draft-ietf-ntp-ntpv5-requirements/). Both consensus calls will run until July 21st 2023 and will be discussed at the next NTP wg meeting at IETF 117 in San Francisco.
>
> The second consensus call:
>
> Regarding leap second smearing:
>
> Currently, the NTPv5 requirement draft states that NTP servers should not apply leap second smearing to transmitted timestamps. Shall NTPv5 support leap second smearing? If yes, shall the NTP server apply leap smearing to the transmitted timestamps or otherwise shall the client perform leap second smearing?


The reason smearing gets used under current NTP versions is because the 
people using it have large-scale issues with timestamp-sensitive 
software, and it's more efficient to implement the smearing on the 
servers than on the clients, which can be orders of magnitude greater in 
terms of scale.  If we prevent this, we will only hinder the adoption of 
newer versions.

So, yes, NTPv5 should support leap second smearing, and yes, it should 
be possible to apply that smearing to the transmitted timestamps so that 
clients don't have to be configured for it.

My suggestion in terms of BCP 14 (RFC 2119/8174) terminology is that NTPv5:

  * MUST support sending non-leap-smeared timestamps
  * MAY support sending leap-smeared timestamps
  * SHOULD send non-leap-smeared timestamps by default
  * if it sends leap-smeared timestamps MUST provide indication (via a
    flag or extension) that they are in use
  * if it sends leap-smeared timestamps, SHOULD send indication (via an
    extension?) of the current UTC-to-smeared-time offset

Regards,
Paul