James said:
> Doesn't NTPsec also use a thread or two to handle NTS-KE traffic? 

Good catch.  Thanks.


>> The other is from the time the transmit side grabs the time until the
>> packet hits the wire. With NTS, that window is a lot larger -- it can't
>> do the crypto until it has put the time stamp in the packet.

> There are a couple of ways around that: to interleave, and the other is
> adding a pair of extensions to hold a better t4' with the latter
> adjusting the UDP checksum. 

Adjusting the UDP checksum doesn't work with NTS.

Interleave requires per-client storage on the server.  I haven't seen a 
good solution to that problem area.


>> There is code in there to yield after N packets to give the
>> other parts of ntpd a chance to run. We could easily add
>> a sleep to that. But then, how long to sleep? I'd like to
>> avoid that rathole.

> It would depend on a few things. In an ideal world, mainly if the SHM
> refclock is enabled because other i/o will joggle select/polls elbow
> leaving scheduled polls/maintenance. Which wants to occur on the second,
> but not every second. 

There is nothing magic about SHM.  The solution is a thread per refclock.


-- 
These are my opinions.  I hate spam.



_______________________________________________
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to