Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Miroslav Lichvar <mlichvar@redhat.com> Tue, 09 August 2022 08:13 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3DA4C15A73A for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 01:13:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.689
X-Spam-Level:
X-Spam-Status: No, score=-7.689 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nx1bNuWd5nQP for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 01:13:06 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 49E5AC15AB6B for <ntp@ietf.org>; Tue, 9 Aug 2022 01:13:06 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660032784; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=2DiCvZe6B4qiqgeSifkle4zNonCL3qK319DkMhTRxPY=; b=iELozGso/e2X0bH8SDi9/7M2hHxjArv4LnEoP6eelH/GnUUD1QIYk8WEMpAvYCzlPBNtEb WhJz7geF7Rysg1VuZMywi29y9C3KLC5oHH4pdmkessEQFWu2qdzW0zmjfY8/dbXnl+x+GU fNhRLagEIamVImacGERlnGaVaL0T8WQ=
Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-583-uLsft245O-eN1R_SxHPiIQ-1; Tue, 09 Aug 2022 04:13:03 -0400
X-MC-Unique: uLsft245O-eN1R_SxHPiIQ-1
Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id E8E62802D1C; Tue, 9 Aug 2022 08:13:02 +0000 (UTC)
Received: from localhost (unknown [10.43.135.229]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 5D5861121314; Tue, 9 Aug 2022 08:13:02 +0000 (UTC)
Date: Tue, 09 Aug 2022 10:13:01 +0200
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Harlan Stenn <stenn@nwtime.org>
Cc: Hal Murray <halmurray@sonic.net>, "ntp@ietf.org" <ntp@ietf.org>
Message-ID: <YvIXDS2EkxzI0nTh@localhost>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <8122203e-ac66-e4d7-5a52-5d053d8fa06a@nwtime.org>
MIME-Version: 1.0
In-Reply-To: <8122203e-ac66-e4d7-5a52-5d053d8fa06a@nwtime.org>
X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/tPk9Lo_alaLHrGHrPLBwSqrRRlM>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 08:13:06 -0000

On Mon, Aug 08, 2022 at 10:33:12PM -0700, Harlan Stenn wrote:
> > NIST servers respond to NTPV4 requests with NTPv3.
> 
> which works perfectly with V4 clients, and it works because of the way the
> protocol was designed and has worked for ntp V1-V4.

It works only with clients that support NTPv3. Not all clients do
that. And v1 is not compatible with v2-v4. There is no mode field yet.

Responding with NTPv3 to an NTPv4 request is ok when you know that the
NTPv4 header is compatible with NTPv3.

The bigger issue is that the NIST servers are responding with NTPv3
even to NTPv5 requests, which is not specified yet. There is nothing
in RFC1305 or RFC5905 that would guarantee future compatibility.

NTPv5 needs to be designed in such a way that if it is misinterpreted
as NTPv3 or NTPv4, it will produce an invalid response that will be
ignored by the client. The current proposal has that property.

> It sure looks to me like the NTPv5 work will be breaking this.

Well, if NTPv5 is expected to have incompatible changes like shorter
extension fields, it cannot be compabile with NTPv4. If it was
compatible with NTPv4, it wouldn't have to change to NTPv5.

-- 
Miroslav Lichvar