Does anybody have any good ideas on a modern way to handle ntpq/mode 6?

Background...

We could split the server side out into a separate process.  That leaves a 
very tiny attack surface from the network.  I think I could do that now except 
for mode 6.

Does anybody have any good ideas on how to replace the current ntpq 
functionality?

Handwave.  My straw man would be to put all the counters into shared memory.  
Then a local-only version of ntpq seems reasonable.  If SSH isn't good enough, 
we could add a TCP or TLS wrapper.

I also want to be able to quickly add more counters.  That gets into a version 
control tangle.  Would it work to have 2 version numbers?  (maybe call them 
version and sub-version)  One for the base/stable counters and another for the 
new/experimental ones?  The idea is that the new ones get folded into the base 
at release time.


Similarly, it would be nice to split the refclocks out into a separate 
process.  We need something better than the current shared memory approach.  
Read only SHM would be OK for data, but we need a clean way to wake up the 
receiving side so it can process the data promptly.

More background...

I'd like to move the current kernel mode PLL to user space.  I think modern 
CPUs are fast enough for that to make sense.  I haven't done any 
experimentation.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to