Hi Tal,

On 2/28/16 1:31 AM, Tal Mizrahi wrote:
Hi Paul,



Isn't this serious? IIUC in many (most?) cases the transmitters and
intermediate nodes won't know if the receiver supports [NTP-Ext].
Inserting this for those that don't will deny them of the time they are looking
for.

Shouldn't there be some discussion of how a decision can be made about
when to use this in order to avoid breaking receivers?


I believe that the Checksum Complement is most useful in LANs and in locally 
administered environments, where both client and server are managed by the same 
administrator. These are the cases where you need a high clock accuracy, and 
you will want to get the extra juice from hardware timestamping + Checksum 
Complement.
I believe it is less likely that the Checksum Complement will be used by a 
client that connects to a random NTP server.

Having said that, I agree that this should be reflected in the draft, and thus 
I suggest the following text for Section 3.3:

"The behavior defined in this document does not impose new requirements on the 
reception of NTP packets beyond the requirements defined in [NTP-Ext]. Note that, as 
defined in [NTP-Ext], a host that receives an NTP message with an unknown extension 
field SHOULD ignore the extension field and MAY drop the packet if policy requires 
it. Thus, transmitters and intermediate nodes that support the Checksum Complement 
can transparently interoperate with receivers that are not 
Checksum-Complement-compliant, as long as these receivers ignore unknown extension 
fields. It is noted that existing implementations that discard packets with unknown 
extension fields cannot interoperate with transmitters that use the Checksum 
Complement.

It should be noted that when hardware-based timestamping is used, it will likely be 
used at both ends, and thus both hosts that take part in the protocol will support 
the functionality described in this memo. If only one of the hosts uses 
hardware-based timestamping, then the Checksum Complement can only be used if it is 
known that the peer host can accept the Checksum Complement."

OK. That seems like a reasonable way to deal with it.

I think so. However the erratam also has exactly the text I was hoping to find
describing how extensions and the mac are parsed out of the packet by the
receiver, and I don't see that in [NTP-Ext]. In principle it is not necessary 
(it is
an exercise for the reader to figure out how to do this) but having it ensures
that developers get it right.

Is there a reason why [NTP-Ext] doesn't also pick that up from the erratam?
(Of course that has no bearing on *this* draft.)

Actually, [NTP-Ext] uses the exact text from the erratum (with some additional 
text in the middle).

What *isn't* in [NTP-Ext] are the notes from the erratum - notably the 2nd one. ISTM that would be very helpful to readers.

(But my review of *this* document isn't conditioned on dealing with that.)

Do you plan to have a revised version out soon? So far this has been a LC review. I'm also on the hook to to a telechat review. There is an amazingly short gap (two days) between end of LC and the telchat. (I've never seen it so tight. I wonder if people will have time to review a revised document for the telechat?

If there is no revised document from the LC before the telechat then I will simply send my same review again as the telechat review, along with a note that we have agreed on some changes. If you plan on getting a new revision out I will try to update my review accordingly.

        Thanks,
        Paul

_______________________________________________
Gen-art mailing list
Gen-art@ietf.org
https://www.ietf.org/mailman/listinfo/gen-art

Reply via email to