Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries

Miroslav Lichvar <mlichvar@redhat.com> Tue, 09 August 2022 10:36 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C795C13CCDE for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 03:36:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.689
X-Spam-Level:
X-Spam-Status: No, score=-2.689 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Q_Bg4Qf07sa for <ntp@ietfa.amsl.com>; Tue, 9 Aug 2022 03:36:30 -0700 (PDT)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8116C14F6E5 for <ntp@ietf.org>; Tue, 9 Aug 2022 03:36:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660041388; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=MKdzDc1FZgwoJ/zEgRQs83LqzaXrXOhEht8Id+/skk4=; b=TObe5ILr1TR2xOoUH7LOf1txgxIEQ8FJcTgACC9roSUdnDNoxgpnI3map7SWfCG8LSCcn5 1hqcmJvM3XKmcgNDlLO6yyLuj8DQ5DuLeliDmA6SMvOJIrW6HBFPYgMCyEb0Aoh2qsJZap /N4+fnh2/VvrXDHyJhaJDGIPqKcOuM4=
Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-468-qjkpgbw7M56IUYEbI5-MZg-1; Tue, 09 Aug 2022 06:36:27 -0400
X-MC-Unique: qjkpgbw7M56IUYEbI5-MZg-1
Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 52EBA3C0F369; Tue, 9 Aug 2022 10:36:27 +0000 (UTC)
Received: from localhost (unknown [10.43.135.229]) by smtp.corp.redhat.com (Postfix) with ESMTPS id A06162166B29; Tue, 9 Aug 2022 10:36:26 +0000 (UTC)
Date: Tue, 09 Aug 2022 12:36:25 +0200
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Martin Burnicki <martin.burnicki=40meinberg.de@dmarc.ietf.org>
Cc: "ntp@ietf.org" <ntp@ietf.org>, Hal Murray <halmurray@sonic.net>, Harlan Stenn <stenn@nwtime.org>
Message-ID: <YvI4qRV+MOrmYKey@localhost>
References: <20220809030711.F00DC28C1CA@107-137-68-211.lightspeed.sntcca.sbcglobal.net> <7eef9a6f-a115-b009-24e5-2b96a8bc02ae@meinberg.de>
MIME-Version: 1.0
In-Reply-To: <7eef9a6f-a115-b009-24e5-2b96a8bc02ae@meinberg.de>
X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/uQIO4WW6gA7NlgAnlS3V6Un-n58>
Subject: Re: [Ntp] Antw: [EXT] Re: Quick review of WGLC for status change for draft‑ietf‑ntp‑update‑registries
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Network Time Protocol <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 09 Aug 2022 10:36:35 -0000

On Tue, Aug 09, 2022 at 12:17:06PM +0200, Martin Burnicki wrote:
> That means:
> 
> - if a v4 server gets v3 request, it should respond with v3
> - if a v4 server gets v4 request, it should respond with v4
> - if a v4 server gets v5 request, it should respond with v4
> 
> The latter should only work if a v5 base packet is compatible with a v4 base
> packet. Otherwise a v4 server wouldn't even recognize and accept a request
> from a v5 client.

The proposed NTPv5 header is not compatible with NTPv4. Servers can
support multiple versions. If they support NTPv5, they should respond
with NTPv5. If they don't support NTPv5, they shouldn't respond with
anything.

Servers that don't check the version field and respond with a NTPv4
response marked as NTPv5 will be ignored by the clients as the client
cookie will not match the request.

> What does make sense, IMO, is a server which can handle *both* types of
> extension fields, to be able to serve time to both old and new clients.
> 
> So the server implementation could
> 
> - check whether a request has extension fields at all
> - if there are, check for plausibility of a chain of new EFs
> - if check of the new EFs fails, try the old EFs
> - use the new or old EF formats in responses to clients

There should be no ambiguity with extension fields. NTPv5 is expected
to be compatible with NTPv4 extension fields. The main use case will
be NTS. Autokey is insecure and should not be used.

NTPv5 extension fields could be contained in NTPv4 packets if the
length was divisible by 4 and it met the RFC7822 requirements, but I'm
not sure why would an NTPv5-capable client talk with a NTPv5-capable
server using NTPv4 with NTPv5 extension fields.

-- 
Miroslav Lichvar