To All -
Current sysadmin here. I think I can synthesize some user stories that may be relevant. > > > On Fri, 30 Sep 2016 14:50:12 -0400 > > > Daniel Franke <dfoxfra...@gmail.com> wrote: > > > > > > > An empty specification in my new language has different semantics > > > > than an empty specification in the old language so at some point > > > > there will have to be a flag day as to which way it is > > > > interpreted, but I don't think this is as big a deal as you've > > > > made it out to be. > > > I tried looking through the archive of the "devel@" mailing list, and couldn't find the relevant message(s). *Daniel*, could you re-post a succinct summary of the *specific* ways an empty spec in the new world would be different than the empty spec in the old world. Specifically, the (possibly insecure) assumptions that would be rendered inoperable. > > > Gary Miller wrote: > > > > > > I think it is a big deal. UNtil we have our own rabid base of > > > followers the only way NTPsec grows is by taking NTP Classic > > > users. They will want a drop in replacement. > > > > > > So any upward extensible is fine, but trivial back-compatibility is > > > essential. Let me see if I can describe how I believe real sysadmins would behave in an imaginary universe where we ship code that is *not* 100% backward compatible: *Story 1: _very_ careful sysadmin* SA - Oh look! A better NTP! (downloads same, *reads the docs carefully*, figures outs their config is busticated) SA - Crap, I've been vulnerable all along!! (fixes config, runs new code) Boss, we are better now. Boss - *applauds* All Good, and Improves Security. *Story 2: careful sysadmin* SA - Oh look! A better NTP! (downloads same, *skims the docs*, installs without much thought) (things break in immediate testing, because they were *relying* on old insecurities) SA - Crap, it's broken! Boss - (glares) SA - (*Now* reads docs carefully, figures out what went wrong, fixes) SA - Boss, it's working now! And we won't get hacked so easily. Boss - *applauds* Good Enough, and Improves Security. *Story 3: usual (overburdened) sysadmin, trusting defaults, etc. - no special config* SA - Oh look! A Better NTP! (downloads same, installs, nothing breaks) Boss - *applauds* Great, and We Improved Internet Security!! *Story 4: usual (overburdened) sysadmin, funky __incompatable__ config* SA - Oh look! A better NTP! (downloads same, installs, *things stop working as expected*) (users / peers complain that things are busticated) Boss - Fix it!! SA (in a panic) - (curses, reads docs, looks at old config, scratches head, curses some more, fixes config, waits for the yelling to stop) SA - Uh, Boss.... I think I fixed it. And, uh, I think we're more secure. Boss (glares) - OK, but why did you break it! SA - Uh, it was broke before, but now it's *much* better. Sucks To Be That SA, but We Improved Internet Security! So it looks like only the people we hurt are those who are running an environment they don't completely understand, *with known vulnerabilities*, who we force to fix their bugs. Is this a rare case? Is it worth inflicting a bit of pain to *Improve Internet Security*? In this <a href="http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/">day and age</a>, is that a *bad* thing? Respectfully submitted, - John D. Bell _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel