Re: [Ntp] NTPv5: big picture

Miroslav Lichvar <mlichvar@redhat.com> Mon, 04 January 2021 15:18 UTC

Return-Path: <mlichvar@redhat.com>
X-Original-To: ntp@ietfa.amsl.com
Delivered-To: ntp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8B4613A0DE6 for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 07:18:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.468
X-Spam-Level:
X-Spam-Status: No, score=-0.468 tagged_above=-999 required=5 tests=[DKIMWL_WL_HIGH=-0.25, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=redhat.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Wv2ldHaxcvhm for <ntp@ietfa.amsl.com>; Mon, 4 Jan 2021 07:18:23 -0800 (PST)
Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [216.205.24.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC2D73A0DE5 for <ntp@ietf.org>; Mon, 4 Jan 2021 07:18:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1609773501; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=W6xEEBmLN4MfQ0EhSSKG6WMUl86Wv6B4zjXnI9MlQYo=; b=TxDyq5W5+1NM3spM4mNnsRlaNxaoi6uv8ojW/5cChuGJ7O4NIYrJKs88eKhY+jOgQL54NN YSU56zzvjdxfCA3fN3uTgykN3j0KCjo9CSdaQdkloLYHP2djiCIupQZTt/XR80nQ/mGMGP CuC07HGk1RbPyLpCWUw5I0gvtl+RfD8=
Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-429-2cRQwpuxP6-d38ME5GvjSg-1; Mon, 04 Jan 2021 10:18:17 -0500
X-MC-Unique: 2cRQwpuxP6-d38ME5GvjSg-1
Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 42481107ACE4; Mon, 4 Jan 2021 15:18:16 +0000 (UTC)
Received: from localhost (holly.tpb.lab.eng.brq.redhat.com [10.43.134.11]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7912019726; Mon, 4 Jan 2021 15:18:15 +0000 (UTC)
Date: Mon, 04 Jan 2021 16:18:13 +0100
From: Miroslav Lichvar <mlichvar@redhat.com>
To: Hal Murray <hmurray@megapathdsl.net>
Cc: NTP WG <ntp@ietf.org>
Message-ID: <20210104151813.GB2992437@localhost>
References: <20210101025440.ECE3340605C@ip-64-139-1-69.sjc.megapath.net>
MIME-Version: 1.0
In-Reply-To: <20210101025440.ECE3340605C@ip-64-139-1-69.sjc.megapath.net>
X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23
Authentication-Results: relay.mimecast.com; auth=pass smtp.auth=CUSA124A263 smtp.mailfrom=mlichvar@redhat.com
X-Mimecast-Spam-Score: 0
X-Mimecast-Originator: redhat.com
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
Archived-At: <https://mailarchive.ietf.org/arch/msg/ntp/vKtfwtLm7Umy0dg8rAf2vweJtlc>
Subject: Re: [Ntp] NTPv5: big picture
X-BeenThere: ntp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <ntp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ntp>, <mailto:ntp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ntp/>
List-Post: <mailto:ntp@ietf.org>
List-Help: <mailto:ntp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ntp>, <mailto:ntp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jan 2021 15:18:25 -0000

On Thu, Dec 31, 2020 at 06:54:40PM -0800, Hal Murray wrote:
> 
> Do we have a unifying theme?  Can you describe why we are working on NTPv5 in 
> one sentence?

There is a list of issues in NTPv4 I would like to see fixed in NTPv5:
https://trac.ietf.org/trac/ntp/wiki/NtpVersionFourIssues

A major issue is that NTPv4 doesn't support short extension fields due
to conflicts with legacy MACs, so fixing all those issues by adding
new extending fields to NTPv4 seems impractical. Some things, e.g. the
timescale selection, makes more sense to have in the header.

> Part of the motivation for this is to enable and encourage OSes to convert to 
> non-leaping time in the kernels.  Are there any subtle details in this area 
> that we should be aware of?  Who should we coordinate with?  ...

I don't think that should be the job of the NTP WG. The kernels will
need to support a leaping UTC timescale for as long as it is needed
for civil time.

NTP should keep support for the existing use cases. It is a protocol
for exchanging timestamps. The client and server need to agree on the
timescale. If both have support for TAI, that's great. They can use it
to avoid ambiguous timestamps around leap seconds. But this shouldn't
be a requirement. NTP needs to support UTC and it needs to announce
leap seconds before they happen. Forcing some servers or clients to
implement an unreliable TAI clock on top of an UTC clock only to make
NTP slightly simpler is not a good idea.

> ---------
> 
> I think this would bring out another important area: How does a client 
> discover if a server supports an option and/or discover servers that do 
> support it?

With most options I think the client can simply send a request using
that option and see if the server's response has it. It can do that
with every request, or try it only occasionally to reduce the average
length of the request and response.

For more complex or conflicting features, the support can be indicated
with a flag in an extension field.

-- 
Miroslav Lichvar