Re: Trying to get in touch: ntp.org sites broken

2021-08-03 Thread Harlan Stenn
Thanks Marco, I'll check with the crew.

On 8/2/2021 11:59 PM, Marco Davids (Private) via NANOG wrote:
> Hello,
> 
> I'm trying to get in touch with webmas...@ntp.org. But so far without
> luck. Maybe this route will help.
> 
> I noticed that quit a number of pages you mention on
> https://www.ntp.org/ are no longer functioning.
> 
> Like http://lists.ntp.org/ and http://support.ntp.org/.
> 
> If anyone knows a way to get this fixed, please help.
> 
> Thank you.
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: CISCO 0-day exploits

2020-02-11 Thread Harlan Stenn



On 2/11/2020 2:04 AM, Saku Ytti wrote:
> On Tue, 11 Feb 2020 at 09:09, Ahmed Borno  wrote:
> 
>> So yeah iACLs, CoPP and all sorts of basic precautions are needed, but I'm 
>> thinking something more needs to be done, specially if these ancient code 
>> stacks are being imported into new age 'IoT' devices, multiplying the attack 
>> vector by a factor of too many.
> 
> I can't see situation getting better. Why should vendor invest in high
> quality code, certainly the cultural shift will cost something, it's
> not 0 cost and what is the upside? If IOS and JunOS realistically were
> significantly less buggy many of us would stop buying support, because
> we either know how to configure these or can get help faster free from
> the community, we largely need the support because the software
> quality is so bad _everyone_ finds new bugs all the time and we don't
> have the source code to fix it as a community.
> So I suspect significantly better quality software would at least
> initially cost more to produce and it would reduce revenue in loss of
> support.

Yeah, things need to get better, and soon.  At least, some things...

Was I too subtle just now?

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-18 Thread Harlan Stenn



On 3/18/2020 4:46 PM, Damian Menscher via NANOG wrote:
> On Wed, Mar 18, 2020 at 8:45 AM Steven Sommars
> mailto:stevesommars...@gmail.com>> wrote:
> 
> The various NTP filters (rate limits, packet size limits) are
> negatively affecting the NTP Pool, the new secure NTP protocol
> (Network Time Security) and other clients.  NTP filters were
> deployed several years ago to solve serious DDoS issues, I'm not
> second guessing those decisions.  Changing the filters to instead
> block NTP mode 7, which cover monlist and other diagnostics, would
> improve NTP usability.
> 
> 
> http://www.leapsecond.com/ntp/NTP_Suitability_PTTI2020_Revised_Sommars.pdf  
> 
> 
> I've advocated a throttle (not a hard block) on udp/123 packets with 468
> Bytes/packet (the size of a full monlist response).  In your paper you
> mention NTS extensions can be 200+ bytes.  How large do those packets
> typically get, in practice?  And how significant is packet loss for them
> (if there's high packet loss during the occasional attack, does that
> pose a problem)?

I expect to see NTP UDP packets that would approach the MTU limit, in
some cases.

If a packet is "too big" for some pathway, then are we talking about a
fractional packet loss or are we talking about 100% packet loss (dropped
mid-way due to size)?

> Damian

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-28 Thread Harlan Stenn
On 3/28/2020 3:29 PM, Bottiger wrote:
> but why isn't BCP 38 widely deployed?  
> 
> 
> Because it costs time and money. People have been asking for it to be
> implemented for decades. It is never going to be deployed on every network.

So you are claiming BCP 38 has to be all or nothing?  That there is *no*
benefit to incremental deployment?

> What fraction of the
> world does implement BCP 38?  
> 
> 
>  Not enough. Everyone has to use it for it to work. Otherwise the
> hackers will still find a network that doesn't have it.

I disagree.  Enough people have to use it for it to work.  And as more
folks use it, there is increasing motivation for more folks to use it.
As the number of deployments increases, one can assume (perhaps
correctly) that it will become less expensive to deploy, and that
additional measures will be found to help accomplish the same thing.

> I'd also be interested in general background info on DDoS.  Who is
> DDoS-ing
> whom and/or why?  Is this gamers trying to get an advantage on a
> competitor? 
> Bad guys making a test run to see if the server can be used for a
> real run?  
> 
> 
> Most motivations for attacks can't be traced. But this is not just a
> gaming problem. It is used to extort businesses for money, destroy
> competitors, shutdown government critics, fame. 
> 
>  Is DDoS software widely available on the dark web?
> 
> 
> You don't need the dark web. It is widely available on Github like most
> other attack types.
> 
> https://github.com/search?q=ntp+ddos  
> 
> Broken protocols need to be removed and blacklisted at every edge.
> Pushing the responsibility to BCP38 is unrealistic.

The monlist attack was mitigated many years' ago.  The problem is that
too many folks don't upgrade their software.

> On Mon, Mar 23, 2020 at 7:43 AM Hal Murray
>  <mailto:hgm%2bna...@ip-64-139-1-69.sjc.megapath.net>> wrote:
> 
> Steven Sommars said:
> > The secure time transfer of NTS was designed to avoid
> amplification attacks.

Uh, no.

If you understand what's going on from the perspective of both the
client and the server and think about the various cases, I think you'll
see what I mean.

NTS is a task-specific hammer.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-28 Thread Harlan Stenn
Ragnar,

On 3/28/2020 4:09 PM, Ragnar Sundblad wrote:
> 
>> On 28 Mar 2020, at 23:58, Harlan Stenn  wrote:
>>
>>> Steven Sommars said:
>>>> The secure time transfer of NTS was designed to avoid
>>>amplification attacks.
>>
>> Uh, no.
> 
> Yes, it was.
> 
> As Steven said, “The secure time transfer of NTS was designed to
> avoid amplification attacks”. I would even say - to make it
> impossible to use for amplification attacks.

Please tell me how.  I've been part of this specific topic since the
original NTS spec.  For what y'all are saying to be true, there are some
underlying assumptions that would need to be in place, and they are
clearly not in place now and won't be until people update their
software, and even better, tweak their configs.

>> If you understand what's going on from the perspective of both the
>> client and the server and think about the various cases, I think you'll
>> see what I mean.
> 
> Hopefully, no-one exposes mode 6 or mode 7 on the internet anymore
> at least not unauthenticated, and at least not the commands that are
> not safe from amplification attacks. Those just can not be allowed
> to be used anonymously.

But mode 6/7 is completely independent of NTS.

It's disingenuous for people to imply otherwise.

>> NTS is a task-specific hammer.
> 
> Yes.
> 
> Ragnar

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-28 Thread Harlan Stenn
Ragnar,

On 3/28/2020 4:59 PM, Ragnar Sundblad wrote:
> 
> 
>> On 29 Mar 2020, at 00:35, Harlan Stenn  wrote:
>>
>> Ragnar,
>>
>> On 3/28/2020 4:09 PM, Ragnar Sundblad wrote:
>>>
>>>> On 28 Mar 2020, at 23:58, Harlan Stenn  wrote:
>>>>
>>>>> Steven Sommars said:
>>>>>> The secure time transfer of NTS was designed to avoid
>>>>>   amplification attacks.
>>>>
>>>> Uh, no.
>>>
>>> Yes, it was.
>>>
>>> As Steven said, “The secure time transfer of NTS was designed to
>>> avoid amplification attacks”. I would even say - to make it
>>> impossible to use for amplification attacks.
>>
>> Please tell me how.  I've been part of this specific topic since the
>> original NTS spec.  For what y'all are saying to be true, there are some
>> underlying assumptions that would need to be in place, and they are
>> clearly not in place now and won't be until people update their
>> software, and even better, tweak their configs.
> 
> The NTS protected NTP request is always of the same size, or in some
> cases larger, than the NTS protected NTP response. It is carefully
> designed to work that way.

So what?

The use of NTS is completely independent of whether or not a server will
respond to a packet.

And an unauthenticated NTP request that generates an unauthenticated
response is *always* smaller than an authenticated request, regardless
of whether or not the server responds.

Claiming that amplification is a significant issue in the case where
there's no amplification but the base packet size is bigger is ignoring
a key piece of information, and is disingenuous in my book.

> Hence, [what Steven said].
> 
>>>> If you understand what's going on from the perspective of both the
>>>> client and the server and think about the various cases, I think you'll
>>>> see what I mean.
>>>
>>> Hopefully, no-one exposes mode 6 or mode 7 on the internet anymore
>>> at least not unauthenticated, and at least not the commands that are
>>> not safe from amplification attacks. Those just can not be allowed
>>> to be used anonymously.
>>
>> But mode 6/7 is completely independent of NTS.
> 
> Exactly. No one needs to, or should, expose mode6/7 at all. They were
> designed at a time when the internet was thought to be nice place were
> people behaved, decades ago, today they are just huge pains in the
> rear. Sadly allowing anonymous mode 6/7 was left in there far to long
> (admittedly being wise in hindsight is so much easier than in advance).
> And here we are, with UDP port 123 still being abused by the bad
> guys, and still being filtered by the networks.

Your statement about "exposing" is imprecise and bordering on incorrect,
at least in some cases.

But again, the use of mode 6/7 is completely independent of NTS.  You
are trying to tie them together.


>> It's disingenuous for people to imply otherwise.
> 
> I couldn’t say, I don’t even know of an example of someone who does.

You've done it in two cases here, from everything I have seen.

> Ragnar

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-28 Thread Harlan Stenn
I think I see the disconnect.

One of the design goals of NTS was to prevent NTS-protected time
requests from being used in amplification attacks.  Yes, that's true.

I've been interpreting this thread as people claiming that NTS will
solve a wider class of amplification vectors, and that's simply not true.

"Universal affirmatives can only be partially converted: all of Alma
Cogen is dead, but only some of the class of dead people are Alma Cogen."

It's also true, and generally not stated, that to the extent that
NTS-protected packets are exchanged, they will require increased network
capacity.  A cynic could argue that requiring additional internet
bandwidth is a profitable goal, and the drama about requiring that extra
protection is the distraction that normalizes that cost.

H

On 3/28/2020 5:18 PM, Harlan Stenn wrote:
> Ragnar,
> 
> On 3/28/2020 4:59 PM, Ragnar Sundblad wrote:
>>
>>
>>> On 29 Mar 2020, at 00:35, Harlan Stenn  wrote:
>>>
>>> Ragnar,
>>>
>>> On 3/28/2020 4:09 PM, Ragnar Sundblad wrote:
>>>>
>>>>> On 28 Mar 2020, at 23:58, Harlan Stenn  wrote:
>>>>>
>>>>>> Steven Sommars said:
>>>>>>> The secure time transfer of NTS was designed to avoid
>>>>>>   amplification attacks.
>>>>>
>>>>> Uh, no.
>>>>
>>>> Yes, it was.
>>>>
>>>> As Steven said, “The secure time transfer of NTS was designed to
>>>> avoid amplification attacks”. I would even say - to make it
>>>> impossible to use for amplification attacks.
>>>
>>> Please tell me how.  I've been part of this specific topic since the
>>> original NTS spec.  For what y'all are saying to be true, there are some
>>> underlying assumptions that would need to be in place, and they are
>>> clearly not in place now and won't be until people update their
>>> software, and even better, tweak their configs.
>>
>> The NTS protected NTP request is always of the same size, or in some
>> cases larger, than the NTS protected NTP response. It is carefully
>> designed to work that way.
> 
> So what?
> 
> The use of NTS is completely independent of whether or not a server will
> respond to a packet.
> 
> And an unauthenticated NTP request that generates an unauthenticated
> response is *always* smaller than an authenticated request, regardless
> of whether or not the server responds.
> 
> Claiming that amplification is a significant issue in the case where
> there's no amplification but the base packet size is bigger is ignoring
> a key piece of information, and is disingenuous in my book.
> 
>> Hence, [what Steven said].
>>
>>>>> If you understand what's going on from the perspective of both the
>>>>> client and the server and think about the various cases, I think you'll
>>>>> see what I mean.
>>>>
>>>> Hopefully, no-one exposes mode 6 or mode 7 on the internet anymore
>>>> at least not unauthenticated, and at least not the commands that are
>>>> not safe from amplification attacks. Those just can not be allowed
>>>> to be used anonymously.
>>>
>>> But mode 6/7 is completely independent of NTS.
>>
>> Exactly. No one needs to, or should, expose mode6/7 at all. They were
>> designed at a time when the internet was thought to be nice place were
>> people behaved, decades ago, today they are just huge pains in the
>> rear. Sadly allowing anonymous mode 6/7 was left in there far to long
>> (admittedly being wise in hindsight is so much easier than in advance).
>> And here we are, with UDP port 123 still being abused by the bad
>> guys, and still being filtered by the networks.
> 
> Your statement about "exposing" is imprecise and bordering on incorrect,
> at least in some cases.
> 
> But again, the use of mode 6/7 is completely independent of NTS.  You
> are trying to tie them together.
> 
> 
>>> It's disingenuous for people to imply otherwise.
>>
>> I couldn’t say, I don’t even know of an example of someone who does.
> 
> You've done it in two cases here, from everything I have seen.
> 
>> Ragnar
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-28 Thread Harlan Stenn



On 3/28/2020 5:35 PM, Ragnar Sundblad wrote:
> 
> 
>> On 29 Mar 2020, at 01:18, Harlan Stenn  wrote:
>>
>> Ragnar,
>>
>> On 3/28/2020 4:59 PM, Ragnar Sundblad wrote:
>>>
>>>
>>>> On 29 Mar 2020, at 00:35, Harlan Stenn  wrote:
>>>>
>>>> Ragnar,
>>>>
>>>> On 3/28/2020 4:09 PM, Ragnar Sundblad wrote:
>>>>>
>>>>>> On 28 Mar 2020, at 23:58, Harlan Stenn  wrote:
>>>>>>
>>>>>>> Steven Sommars said:
>>>>>>>> The secure time transfer of NTS was designed to avoid
>>>>>>>  amplification attacks.
>>>>>>
>>>>>> Uh, no.
>>>>>
>>>>> Yes, it was.
>>>>>
>>>>> As Steven said, “The secure time transfer of NTS was designed to
>>>>> avoid amplification attacks”. I would even say - to make it
>>>>> impossible to use for amplification attacks.
>>>>
>>>> Please tell me how.  I've been part of this specific topic since the
>>>> original NTS spec.  For what y'all are saying to be true, there are some
>>>> underlying assumptions that would need to be in place, and they are
>>>> clearly not in place now and won't be until people update their
>>>> software, and even better, tweak their configs.
>>>
>>> The NTS protected NTP request is always of the same size, or in some
>>> cases larger, than the NTS protected NTP response. It is carefully
>>> designed to work that way.
>>
>> So what?
>>
>> The use of NTS is completely independent of whether or not a server will
>> respond to a packet.
>>
>> And an unauthenticated NTP request that generates an unauthenticated
>> response is *always* smaller than an authenticated request, regardless
>> of whether or not the server responds.
>>
>> Claiming that amplification is a significant issue in the case where
>> there's no amplification but the base packet size is bigger is ignoring
>> a key piece of information, and is disingenuous in my book.
> 
> You are now comparing unauthenticated mode 3 and mode 4 packets to
> cryptographically secured ones, which is a completely different thing.
> 
> Disingenuous?

I made no such claim.

I was talking about:

>>>>> As Steven said, “The secure time transfer of NTS was designed to
>>>>> avoid amplification attacks”. I would even say - to make it
>>>>> impossible to use for amplification attacks.

and that statement is not as clear as it could be.  Specifically:

 NTS was designed to avoid amplification attacks

is vague.

You have just now written:

> You are now comparing unauthenticated mode 3 and mode 4 packets to
> cryptographically secured ones, which is a completely different thing.

Completely different?  How?

Where is the amplification in an unauthenticated mode 3 request and an
unauthenticated response?

How does cryptographically securing these packets make any difference here?

> A protocol with varying packet size, as the NTS protected NTP is,
> can easily have the bad property of having responses larger than the
> requests if not taken care. Don’t you see that?

I sure think I understand these points.

Who here has said that there was any problem with there being an
amplification issue with properly-authenticated NTS packets?

The current NTS spec is *only* written for mode 3/4 exchanges.  While it
might be applicable for mode 6/7, I haven't seen any specs for this
usage.  In the NTP Project's Reference implementation there are extra
implementation-specific protections built in to mode 6/7 exchanges.
While some of this might be addressed in the NTS spec, I don't recall
ever seeing this.

So why are you talking about mode 6/7 in this context?

>>> Hence, [what Steven said].
>>>
>>>>>> If you understand what's going on from the perspective of both the
>>>>>> client and the server and think about the various cases, I think you'll
>>>>>> see what I mean.
>>>>>
>>>>> Hopefully, no-one exposes mode 6 or mode 7 on the internet anymore
>>>>> at least not unauthenticated, and at least not the commands that are
>>>>> not safe from amplification attacks. Those just can not be allowed
>>>>> to be used anonymously.
>>>>
>>>> But mode 6/7 is completely independent of NTS.
>>>
>>> Exactly. No one needs to, or should, expose mode6/7 at all. They were
>>> designed at a time when the internet was thought to be 

Re: UDP/123 policers & status

2020-03-30 Thread Harlan Stenn



On 3/29/2020 11:18 PM, Saku Ytti wrote:
> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad  wrote:
> 
>> A protocol with varying packet size, as the NTS protected NTP is,
>> can easily have the bad property of having responses larger than the
>> requests if not taken care. Don’t you see that?
> 
> Why? Why not pad requests to guarantee attenuation vector until
> authenticity of packets can be verified?
> 
> MinimaLT does this. I think all UDP based and initial TCP should do
> it, doing it for existing protocols may not be possible, but why not
> for new?
> 
> I proposed similar method for proxy-trace (bidir tracerouting) -
> https://github.com/ytti/proxy-trace/blob/master/draft-ytti-intarea-proxy-trace.xml#L169

Please help me understand this.

Exactly how bad is it if the query and response packets are of a
different size?  Does it matter at 4 bytes?  32?

what are the expected costs of different %s of response packets being
sent back?  I think this needs to be understood for a variety of
different sized query/response packets.

Then factor in the costs of padding the shorter packets.  Include the
cost of the actual bump in network bandwidth, which I suspect is
negligible, and at the same time we can do a reality check on the folks
who claim that NTP packets are a significant cause of the bufferbloat
problem.

Then we need to thoroughly study how the various size differences
between the client request and server response packets affect the
quality of time synchronization, in various network scenarios.  Some
have claimed this is clearly noticeable and significant.  I'd like to
see the experiments and the data.

NTF is very happy to do this work, incrementally if needed, if we can
get the necessary support and cooperation/collaboration.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-30 Thread Harlan Stenn



On 3/30/2020 1:27 AM, Saku Ytti wrote:
> On Mon, 30 Mar 2020 at 11:15, Harlan Stenn  wrote:
> 
>> Please help me understand this.
>>
>> Exactly how bad is it if the query and response packets are of a
>> different size?  Does it matter at 4 bytes?  32?
> 
> Presumably, if it's attenuation vector (1byte or more), presumably
> attacker will use any of the other many vectors which are
> amplification vectors or will directly attack from the zombie machines
> they pwn. Since NST would have negative ROI on attack if there is
> _any_ attenuation.

OK, and exactly how bad is a single byte attenuation, when compared
against the cost of 100% of all of the 1-byte shorter NTP packets being
made bigger to make the attenuation vector 0?

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-03-30 Thread Harlan Stenn
On 3/30/2020 2:01 AM, Ragnar Sundblad wrote:
> 
> 
>> On 30 Mar 2020, at 08:18, Saku Ytti  wrote:
>>
>> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad  wrote:
>>
>>> A protocol with varying packet size, as the NTS protected NTP is,
>>> can easily have the bad property of having responses larger than the
>>> requests if not taken care. Don’t you see that?
>>
>> Why? Why not pad requests to guarantee attenuation vector until
>> authenticity of packets can be verified?
> 
> Right, and NTS does that.

There is more to NTP than NTS.

Are y'all seriously recommending that NTP always sends a max-sized
packet as a client request so the client/server can send back an
identical response?

The alternative seems to be that the client sends a smaller request and
is ready when the response from the server is "Send your request again,
but this time pad it to NNN bytes so I can respond with the same sized
packet"?

> Ragnar

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-04-16 Thread Harlan Stenn
I found this as an unsent draft - I hope I didn't send it before.

On 3/30/2020 2:01 AM, Ragnar Sundblad wrote:
> 
> 
>> On 30 Mar 2020, at 08:18, Saku Ytti  wrote:
>>
>> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad  wrote:
>>
>>> A protocol with varying packet size, as the NTS protected NTP is,
>>> can easily have the bad property of having responses larger than the
>>> requests if not taken care. Don’t you see that?
>>
>> Why? Why not pad requests to guarantee attenuation vector until
>> authenticity of packets can be verified?
> 
> Right, and NTS does that.

There is more to NTP than NTS.

Are y'all seriously recommending that NTP always sends a max-sized
packet as a client request so the client/server can send back an
identical response?  That's just wasting huge amounts of bandwidth to
save the possibility of a possibly larger response.

And just becase a responbse may be larger, that doesn't necessarily
translate into an amplification vector.

The alternative seems to be that the client sends a smaller request and
is ready when the response from the server is "Send your request again,
but this time pad it to NNN bytes so I can respond with the same sized
packet"?

> Ragnar

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!




Re: UDP/123 policers & status

2020-04-17 Thread Harlan Stenn
NTP uses UDP for time.

I'm not sure what you're talking about.

H

On 4/17/20 1:32 AM, Ragnar Sundblad wrote:
> 
> 
>> On 17 Apr 2020, at 01:28, Harlan Stenn  wrote:
>>
>> I found this as an unsent draft - I hope I didn't send it before.
>>
>> On 3/30/2020 2:01 AM, Ragnar Sundblad wrote:
>>>
>>>
>>>> On 30 Mar 2020, at 08:18, Saku Ytti  wrote:
>>>>
>>>> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad  wrote:
>>>>
>>>>> A protocol with varying packet size, as the NTS protected NTP is,
>>>>> can easily have the bad property of having responses larger than the
>>>>> requests if not taken care. Don’t you see that?
>>>>
>>>> Why? Why not pad requests to guarantee attenuation vector until
>>>> authenticity of packets can be verified?
>>>
>>> Right, and NTS does that.
>>
>> There is more to NTP than NTS.
>>
>> Are y'all seriously recommending that NTP always sends a max-sized
>> packet as a client request so the client/server can send back an
>> identical response?  That's just wasting huge amounts of bandwidth to
>> save the possibility of a possibly larger response.
> 
> If there is no sender verification, yes. It doesn’t have to be larger
> than the maximum response size.
> 
> Another option is to use TCP - the handshake solves the problem.
> 
>> And just becase a responbse may be larger, that doesn't necessarily
>> translate into an amplification vector.
> 
> If there is no sender verification, it generally does.
> In what case does it not?
> 
>> The alternative seems to be that the client sends a smaller request and
>> is ready when the response from the server is "Send your request again,
>> but this time pad it to NNN bytes so I can respond with the same sized
>> packet"?
> 
> Sure, that is one way!
> Or - Here are the first N entries, send another request for the
> next batch, optionally: there are M entries in total.
> Or - TCP.
> There likely are many other options.
> 
> Ragnar
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: UDP/123 policers & status

2020-04-17 Thread Harlan Stenn
On 4/17/2020 2:01 AM, Ragnar Sundblad wrote:
> 
> I thought we were talking about control traffic.

I expect there will be a TCP control traffic option.

I expect there will continue to be a UDP control traffic option.

These are "mechanisms", there will be a reasonable default policy (that
will change and evolve over time), and there will be a mechanism to
allow the local admins to implement their local policy choices.

> If you want to do some NTP time comparison mode with larger responses
> than requests, I agree that TCP is likely not a good option.

I still don't see why, in the general case, some here think we must
force a smaller request packet to be padded just so a possibly larger
response packet will provide no amplification.

Basic packets are of a known and identical size.  Before the 7822
braindamage (my opinion of 7822), EFs *required* MACs.  Post 7822 they
don't, but even so, if people implement EFs and don't include (disable?)
"protection" they've pretty much made their choice.  But we're speaking
in generalities here.

What new or proposed packet content would trigger a larger response that
would not require an authenticated request in the first place?

And I just realized this is the NANOG list and not the NTP list, so I'm
happy to stop.

H
--
> Ragnar
> 
>> On 17 Apr 2020, at 10:44, Harlan Stenn  wrote:
>>
>> NTP uses UDP for time.
>>
>> I'm not sure what you're talking about.
>>
>> H
>>
>> On 4/17/20 1:32 AM, Ragnar Sundblad wrote:
>>>
>>>
>>>> On 17 Apr 2020, at 01:28, Harlan Stenn  wrote:
>>>>
>>>> I found this as an unsent draft - I hope I didn't send it before.
>>>>
>>>> On 3/30/2020 2:01 AM, Ragnar Sundblad wrote:
>>>>>
>>>>>
>>>>>> On 30 Mar 2020, at 08:18, Saku Ytti  wrote:
>>>>>>
>>>>>> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad  wrote:
>>>>>>
>>>>>>> A protocol with varying packet size, as the NTS protected NTP is,
>>>>>>> can easily have the bad property of having responses larger than the
>>>>>>> requests if not taken care. Don’t you see that?
>>>>>>
>>>>>> Why? Why not pad requests to guarantee attenuation vector until
>>>>>> authenticity of packets can be verified?
>>>>>
>>>>> Right, and NTS does that.
>>>>
>>>> There is more to NTP than NTS.
>>>>
>>>> Are y'all seriously recommending that NTP always sends a max-sized
>>>> packet as a client request so the client/server can send back an
>>>> identical response?  That's just wasting huge amounts of bandwidth to
>>>> save the possibility of a possibly larger response.
>>>
>>> If there is no sender verification, yes. It doesn’t have to be larger
>>> than the maximum response size.
>>>
>>> Another option is to use TCP - the handshake solves the problem.
>>>
>>>> And just becase a responbse may be larger, that doesn't necessarily
>>>> translate into an amplification vector.
>>>
>>> If there is no sender verification, it generally does.
>>> In what case does it not?
>>>
>>>> The alternative seems to be that the client sends a smaller request and
>>>> is ready when the response from the server is "Send your request again,
>>>> but this time pad it to NNN bytes so I can respond with the same sized
>>>> packet"?
>>>
>>> Sure, that is one way!
>>> Or - Here are the first N entries, send another request for the
>>> next batch, optionally: there are M entries in total.
>>> Or - TCP.
>>> There likely are many other options.
>>>
>>> Ragnar
>>>
>>>
>>
>> -- 
>> Harlan Stenn 
>> http://networktimefoundation.org - be a member!
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: IERS ponders reverse leapsecond...

2022-08-08 Thread Harlan Stenn

On 8/3/2022 8:09 AM, Jay Ashworth wrote:

General press loses its *mind*:

https://www.cbsnews.com/news/earth-spinning-faster-than-usual-shortest-day-ever/#app 
<https://www.cbsnews.com/news/earth-spinning-faster-than-usual-shortest-day-ever/#app>


Have you tested leap second handling, especially in reverse? How do you 
simulate it? Are there existing test harnesses for simulating it?


It's somewhere between trivial and straightforward to test 
forward/reverse leap seconds with an NTP server and a (dedicated) client.



Cheers,
-- jra
--
Sent from my Android device with K-9 Mail. Please excuse my brevity.


--
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: IERS ponders reverse leapsecond...

2022-08-08 Thread Harlan Stenn

I've been thinking about this problem for several decades.

I believe I have a Good solution to it.  It's the General Timestamp API 
effort at Network Time Foundation.


If you have been paying any attention, you will immediately realize that 
the effort is stalled because of a lack of funding.


I'm hesitant to say more, as there are some other groups with partial 
solutions who think they have the complete solution; and since these 
groups are much better funded, they are happy to forge ahead based on 
their view of the world.


I will say that the GTSAPI is designed around a "robust mechanism" that 
can implement every "local policy choice" I have seen around "how do we 
want to deal with 'time'?"


It addresses using timestamps beyond the execution of the current boot 
of the local system, and includes conversions between different versions 
of different timescales, and a library for arithmetic and comparison 
functions.


H

On 8/3/2022 8:33 AM, Matthew Huff wrote:

True,

But it's hard enough to get developers to understand the need to code for 61 
seconds in a minute, and now they would need to code for 59 seconds as well.

If time systems simply skewed the time so that 60 seconds actually just took 61 
seconds or 59 seconds, there would be other issues, but coders wouldn't be 
involved.



-Original Message-
From: NANOG  On Behalf Of Stephane 
Bortzmeyer
Sent: Wednesday, August 3, 2022 11:19 AM
To: Jay Ashworth 
Cc: nanog@nanog.org
Subject: Re: IERS ponders reverse leapsecond...

On Wed, Aug 03, 2022 at 11:09:25AM -0400,  Jay Ashworth  
wrote  a message of 32 lines which said:


General press loses its *mind*:


Indeed, they seem not to know what they write about. "atomic time – the universal 
way time is measured on Earth – may have to change" They don't even know the 
difference between TAI and UTC.



--
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn
So I gotta ask, just as a reality check:

- Why do folks want to have one or more NTP server masters that have at
least 1 refclock on them in a data center, instead of having their data
center NTP server masters that only get time over the internet?

- What % of data center operators provide time servers in their data
centers for their tenants (or for the general public)?

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/19 2:59 PM, Andreas Ott wrote:
> On Wed, May 01, 2019 at 02:35:58PM -0700, Harlan Stenn wrote:
>> - Why do folks want to have one or more NTP server masters that have at
>> least 1 refclock on them in a data center, instead of having their data
>> center NTP server masters that only get time over the internet?
> 
> I had that discussion before with the QSA for a compliance audit, pointing
> to requirement "10.4.3 Time settings are received from industry-accepted
> time sources" and "verify that the time server(s) accept time updates from
> specific, industry-accepted external sources (to prevent a malicious
> individual from changing the clock)" in the PCI-DSS document. He
> non-jokingly suggested "why don't you use pool.ntp.org?", not really
> realizing how many servers are in fact just someone's PC behind a cable
> modem in their home, which negated the "do I trust the time I am 
> receiving?". My immediate answer was "we could use NIST servers", 
> but the easiest way out of this is "we operate our own NTP appliance 
> with a GPS receiver" and provide that as evidence.
> 
> Don't get me wrong, I support pool.ntp.org by operating and contributing 
> servers to it, but it is not deemed good enough if you need traceability
> of your NTP time source(s), even though the pool will only admit members
> above a certain quality threshold.

I have no immediate agenda here.  My sole purpose is to get information
about this, as I mostly work with people who a) believe accurate time is
important, and b) at least have an appreciation for how unexpectedly
difficult it is to synchronize time in a predictable and stable way
across a large population of systems in a diverse set of environments.

In my experience, people who don't fall in to either of those categories
are pretty well invested in their opinions.

>> - What % of data center operators provide time servers in their data
>> centers for their tenants (or for the general public)?
> 
> My $employer does that in our datacenters and points of presence for
> our customers.

Glad to hear it!

> -andreas
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/2019 4:17 PM, Brandon Martin wrote:
> On 5/1/19 7:03 PM, Harald Koch wrote:
>> Properly deployed NTP should calibrate the local hardware clocks to
>> prevent drift even during connectivity outages. (I'm talking both the
>> low resolution hardware clocks used for timing across power cycles and
>> reboots, and the oscillators used while the OS is running). While most
>> computer hardware is temperature sensitive, if your datacenter is
>> suddenly changing temperature enough to cause clock drift, well, you
>> have bigger problems.:)
> 
> For sure, sudden loss of time "shouldn't" happen, but having a local
> refclock is comparatively cheap insurance against it in many deployments.

BCP these days is "orphan mode", not "local refclock".

> I've seen things like this when there's a sudden power loss across a
> small site e.g. a remote PoP.  Think a loss of utility power and UPS
> fails to transfer for some unanticipated reason.  Everything will come
> back up when either the utility power comes back or generator spins up,
> but it will all be hard reset.  Depending on your NTP implementation,
> the local hardware clock may not be particularly accurate.  Even good
> implementations often lack the necessary hardware capabilities to trim
> the low-resolution hardware reference and have to resort to simply
> flushing the time to hardware every so often.
> 
> Relative inaccuracies of a few seconds are pretty normal in that kind of
> situation in my experience.  Putting everything together from logs where
> there's an unknown time offset of a few seconds after the fact can be
> tough.  Then again, maybe you don't care in this example case since the
> cause of the problem is proximate - the frigging UPS didn't do its job.
>  More complex scenarios might be easily envisioned, though.
> 
> Now, obviously you've still got an issue of the fact that the GPS refclk
> will take a while to lock and start serving time, but at least you've
> potentially got known-good time info before you start bringing
> higher-level network protocols up (and can purposely delay until you do,
> if desired) which is potentially impossible if your only source of time
> is the network itself.

Ah, this is the dance with "have enough sources of time"...
-- 
Harlan Stenn, Network Time Foundation
http://nwtime.org - be a Member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/19 5:39 PM, William Herrin wrote:
> On Wed, May 1, 2019 at 12:23 PM Mehmet Akcin  wrote:
> 
>> I am trying to buy a GPS based NTP server like this one
>>
>> https://timemachinescorp.com/product/gps-time-server-tm1000a/
>>
>> but I will be placing this inside a data center, do these need an actual
>> view of a sky to be able to get signal or will they work fine inside a data
>> center building? if you have any other hardware requirements to be able to
>> provide stable time service for hundreds of customers, please let me know.
>>
> 
> You buy a powered GPS antenna for it. Which antenna depends on the cable
> length and type. The amplifier in the antenna amplifies the signal just
> enough to overcome the cable loss between the antenna and the receiver.
> Nice thick cables lose less signal. Dinky thin ones are easier to work with.
> 
> You sure you need a GPS NTP server? You understand that if you do, you need
> two for reliability right, and probably at geographically diverse
> locations? If you're not on an air-gapped network, consider syncing a
> couple head-end NTP servers against tick and tock (.usno.navy.mil, the
> naval observatory) and not worrying about it. One less piece of equipment
> to manage, update, secure, etc.

Two is not a great number.  If they disagree, there is no majority
clique to be found.

Also, there is something to be said for using different models/vendors
for the time sources.  If you only have the same model from one vendor
and there is a bug, you can lose all your time sources at once.   The
GPS week rollover happens every ~19.7 years, and when that problem hits
is a function of the firmware and a manufacturing date put in the firmware.

These problems can be mitigated if you have "enough" time sources for
your internal NTP servers and you peer with enough other, possibly your,
servers.

> Regards,
> Bill Herrin

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/19 4:53 PM, Mel Beckman wrote:
> Ask,
> 
> But with a small compact server like the DC-powered TimeMachines Inc unit, 
> which costs something like $300, you simply put the server where the 
> visibility is and connect back to the nearest Ethernet port in your network, 
> up to 300’ away, or virtually any distance with fiber transceivers. We’ve 
> installed these in Cantex boxes on a windy, rainy tenth-story rooftop in 
> upstate NY and it runs flawlessly, warmed by its own internal heat at 
> sub-zero temps, and perfectly happy at ambient temps of 110F. 
> 
> It’s hard to consider messing with signal converters and pricey 
> remotely-powered active antennas when you can solve the problem for $300. :)

I sure hope you have ntpd set up to peer or get time with enough other
servers.

H
--
>  -mel 
> 
>> On May 1, 2019, at 4:44 PM, Ask Bjørn Hansen  wrote:
>>
>>
>>
>>> On May 1, 2019, at 12:22, Mehmet Akcin  wrote:
>>>
>>> I am trying to buy a GPS based NTP server like this one 
>>>
>>> https://timemachinescorp.com/product/gps-time-server-tm1000a/
>>>
>>> but I will be placing this inside a data center, do these need an actual 
>>> view of a sky to be able to get signal or will they work fine inside a data 
>>> center building? if you have any other hardware requirements to be able to 
>>> provide stable time service for hundreds of customers, please let me know.
>>
>> [ with my hobby-hat on … ]
>>
>> tl;dr: if any of the below is too much work, just run reasonably well 
>> monitored NTP server syncing from other NTP servers. If you want more than 
>> that, you need to see the sky. Don’t do the CDMA thing.
>>
>> Depending on your requirements having the antenna in the window may or may 
>> not be satisfactory. If it’s fine you probably could just have done a 
>> regular NTP server in the first place.  For long swaths of the day you might 
>> not see too many satellites which will add to the uncertainty of the signal.
>>
>> Meinberg’s GPS antenna has a bit more smarts which helps it work on up to 
>> 300 meters on RG58 or 700 meters on RG213.  (They also have products that 
>> use regular L1 antennas with the limitations Bryan mentioned).
>>
>> https://www.meinbergglobal.com/english/products/gps-antenna-converter.htm
>>
>> They also have a multi-mode fiber box to have the antenna be up to 2km from 
>> the box or 20km with their single mode fiber box, if you have fiber to 
>> somewhere else where you can see the sky and place an antenna.
>>
>> It will be more than the one you linked to, but their systems are very 
>> reasonably priced, too. For “hundreds of customers” whatever is the 
>> smallest/cheapest box they have will work fine. Even their smallest models 
>> have decent oscillators (for keeping the ticks accurate between GPS signals).
>>
>> The Meinberg time server products (I am guessing all of them, but I’m not 
>> sure) also have a mode where they poll an upstream NTP server aggressively 
>> and then steer the oscillator after it. I haven’t used it in production, but 
>> it worked a lot better than it sounded like it would.  (In other words, even 
>> without GPS it’s a better time server than most systems).
>>
>>
>> Ask

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP Question

2019-05-01 Thread Harlan Stenn



On 5/1/19 4:28 PM, Mel Beckman wrote:
> Harlan and Mehmet,
> 
> I can expand on one important reason that James only alluded to with his 
> “Kepping the Auditors happy” comment.
> 
> Passing NTP through a firewall and then using that as a critical time 
> reference source represents a huge security risk. Here’s one detailed 
> explanation of that risk:
> 
> https://insights.sei.cmu.edu/sei_blog/2017/04/best-practices-for-ntp-services.html

I have some significant disagreements with some of the assumptions and
positions in that posting, for whatever that's worth.  And there are
some good points in there, too.

H
--

>  -mel
> 
> On May 1, 2019, at 3:48 PM, James R Cutler 
> mailto:james.cut...@consultant.com>> wrote:
> 
> On Wed, May 01, 2019 at 02:35:58PM -0700, Harlan Stenn wrote:
> - Why do folks want to have one or more NTP server masters that have at
> least 1 refclock on them in a data center, instead of having their data
> center NTP server masters that only get time over the internet?
> 
> Answers to that include:
> 
>   *   Keeping the Auditors happy
>   *   Knowing that “everyone does it” - the vendor told them so
>   *   Bragging rights (expensive hardware)
>   *   Being unbothered by fighting with facilities for building penetrations 
> and antenna mounts
>   *   Misunderstanding the beauty and economy Dave Mills marvelous algorithms 
> for consistent time based on multiple sources, even those connected via 
> internet
>   *   Unwillingness or inability to leverage other local resources capacity 
> to run ntpd with minimal impact in order to have a good constellation of 
> local NTP servers
>   *   Willingness to farm out time service without doing a deep dive into why 
> and how, just leaving the design to the appliance vendors
> 
> This covers most of what I have encountered in providing enterprise time 
> services for $dayjob+clients. I probably left out some significant points, 
> but it has been a few years...
> 
> 
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/19 5:55 PM, William Herrin wrote:
> On Wed, May 1, 2019 at 5:48 PM Keith Medcalf  wrote:
> 
>> If you have one such installation, then you really do not care about the
>> "accuracy" of the time.  However if you have multiple such installations
>> then you want them all to have the same time (if you will be comparing logs
>> between them, for example).  At some point it becomes "cheaper" to spend
>> thousands of dollars per site to have a single Stratum 0 timesource (for
>> example, the GPS system) at each site (and thus comparable time stamps)
>> than it is to pay someone to go though the rigamarole of computing offsets
>> and slew rates between sites to be able to do accurate comparison.  And if
>> you communicate any of that info to outsiders then being able to say "my
>> log timestamps are accurate to +/- 10 nanoseconds so it must be you who is
>> farked up" (and be able to prove it) has immense value.
>>
> 
> If your network is air gapped from the Internet then sure. If it's not, you
> can run NTP against a reasonably reliable set of time sources (not random
> picks from Pool) and be able to say, "my log timestamps are accurate to +/-
> 10 milliseconds so it must be you who is farked up." While my milliseconds
> loses the pecking order contest, it's just as good for practical purposes
> and a whole lot less expensive.

It's not clear to me that there's anything *wrong* with using the pool,
especially if you're using our 'pool' directive in your config file.

That directive will bring up ~10 associations and continuously evaluate
their quality, throwing out the poor performers and soliciting new
servers of currently-good quality to replace them.

This goes to "have _enough_ good-quality servers, and monitor your ntpd".

> If your system is Internet-connected. If you run an air gapped network then
> yeah, get your time out of band.
> 
> Regards,
> Bill Herrin
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn
Hi Keith,

On 5/1/19 6:17 PM, Keith Medcalf wrote:
> 
>> If your network is air gapped from the Internet then sure. If it's
>> not, you can run NTP against a reasonably reliable set of time
>> sources (not random picks from Pool) and be able to say, "my log
>> timestamps are accurate to +/- 10 milliseconds so it must be you who
>> is farked up." While my milliseconds loses the pecking order contest,
>> it's just as good for practical purposes and a whole lot less
>> expensive.
> 
> You mean something like this, which is relatively easy to achieve:
> 
> ==
> offset -0.09, frequency -0.823, time_const 30, watchdog 238
> synchronised to NTP server (192.5.41.40) at stratum 2
>time correct to within 12 ms
>polling server every 1024 s
> ==
>  remote   refid  st t when poll reach   delay   offset  jitter
> ==
> +clock.sjc.he.ne .CDMA.   1 u  287 1024  377   64.3130.337   0.867
> -tock.usnogps.na .IRIG.   1 u5 1024  377  103.080   -2.097   0.316
> -tick.usnogps.na .IRIG.   1 u  806 1024  377  103.053   -2.328   0.363
> +india.colorado. .NIST.   1 u  270 1024  377   41.214   -0.159   0.113
> +time-b-b.nist.g .NIST.   1 u  984 1024  377   42.6090.200   0.045
> +time-c-b.nist.g .NIST.   1 u  180 1024  377   42.5630.201   0.064
> +time-a-b.nist.g .NIST.   1 u  163 1024  377   42.6390.137   0.032
> *192.5.41.40 .PTP.1 u  235 1024  377   12.756   -0.388  12.479
> -192.5.41.41 .IRIG.   1 u  312 1024  377   13.575   -1.172   2.425
>  LOCAL(0).LOCL.  10 l-   6400.0000.000   0.000
> --
> pll offset:   -8.474e-06 s
> pll frequency:-0.823 ppm
> maximum error:0.123149 s
> estimated error:  0.000122 s
> status:   2001  pll nano
> pll time constant:10
> precision:1e-09 s
> frequency tolerance:  500 ppm
> ==

That all looks great except for the LOCAL clock at S10.  In the event
you lose connectivity to the outside, this system will jump from S2 to
S10.  Depending on the setup of your other systems, groups of them will
go sailing off in their own directions.

http://support.ntp.org/bin/view/Support/OrphanMode is the better solution.

If you cannot do that for some reason, please see the "Dual Time
Servers" case at
http://support.ntp.org/bin/view/Support/UndisciplinedLocalClock .

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-01 Thread Harlan Stenn



On 5/1/19 7:54 PM, Mel Beckman wrote:
> Harlan,
> 
> Why? The GPS NTP Server is Stratum-1.  If it fails computer clocks will 
> freewheel for hours or days before losing significant time, during which 
> period you can simply order a replacement unit. If that isn’t fast enough, 
> buy two $300 boxes. The “consensus” issue is moot, since a GPS server gets a 
> consensus of clock time from the GPS satellite constellation. 
> 
> The “enough NTP peers” you speak of are simply not necessary. 

You might be right about the GPS server.  It depends on how your $300
box behaves if it loses the GPS signal.

The consensus issue isn't about the number of satellites the GPS
receiver sees, it's about the number of time sources your NTP servers see.

H
--
> -mel via cell
> 
>> On May 1, 2019, at 6:49 PM, Harlan Stenn  wrote:
>>
>>
>>
>>> On 5/1/19 4:53 PM, Mel Beckman wrote:
>>> Ask,
>>>
>>> But with a small compact server like the DC-powered TimeMachines Inc unit, 
>>> which costs something like $300, you simply put the server where the 
>>> visibility is and connect back to the nearest Ethernet port in your 
>>> network, up to 300’ away, or virtually any distance with fiber 
>>> transceivers. We’ve installed these in Cantex boxes on a windy, rainy 
>>> tenth-story rooftop in upstate NY and it runs flawlessly, warmed by its own 
>>> internal heat at sub-zero temps, and perfectly happy at ambient temps of 
>>> 110F. 
>>>
>>> It’s hard to consider messing with signal converters and pricey 
>>> remotely-powered active antennas when you can solve the problem for $300. :)
>>
>> I sure hope you have ntpd set up to peer or get time with enough other
>> servers.
>>
>> H
>> --
>>> -mel 
>>>
>>>> On May 1, 2019, at 4:44 PM, Ask Bjørn Hansen  wrote:
>>>>
>>>>
>>>>
>>>>> On May 1, 2019, at 12:22, Mehmet Akcin  wrote:
>>>>>
>>>>> I am trying to buy a GPS based NTP server like this one 
>>>>>
>>>>> https://timemachinescorp.com/product/gps-time-server-tm1000a/
>>>>>
>>>>> but I will be placing this inside a data center, do these need an actual 
>>>>> view of a sky to be able to get signal or will they work fine inside a 
>>>>> data center building? if you have any other hardware requirements to be 
>>>>> able to provide stable time service for hundreds of customers, please let 
>>>>> me know.
>>>>
>>>> [ with my hobby-hat on … ]
>>>>
>>>> tl;dr: if any of the below is too much work, just run reasonably well 
>>>> monitored NTP server syncing from other NTP servers. If you want more than 
>>>> that, you need to see the sky. Don’t do the CDMA thing.
>>>>
>>>> Depending on your requirements having the antenna in the window may or may 
>>>> not be satisfactory. If it’s fine you probably could just have done a 
>>>> regular NTP server in the first place.  For long swaths of the day you 
>>>> might not see too many satellites which will add to the uncertainty of the 
>>>> signal.
>>>>
>>>> Meinberg’s GPS antenna has a bit more smarts which helps it work on up to 
>>>> 300 meters on RG58 or 700 meters on RG213.  (They also have products that 
>>>> use regular L1 antennas with the limitations Bryan mentioned).
>>>>
>>>> https://www.meinbergglobal.com/english/products/gps-antenna-converter.htm
>>>>
>>>> They also have a multi-mode fiber box to have the antenna be up to 2km 
>>>> from the box or 20km with their single mode fiber box, if you have fiber 
>>>> to somewhere else where you can see the sky and place an antenna.
>>>>
>>>> It will be more than the one you linked to, but their systems are very 
>>>> reasonably priced, too. For “hundreds of customers” whatever is the 
>>>> smallest/cheapest box they have will work fine. Even their smallest models 
>>>> have decent oscillators (for keeping the ticks accurate between GPS 
>>>> signals).
>>>>
>>>> The Meinberg time server products (I am guessing all of them, but I’m not 
>>>> sure) also have a mode where they poll an upstream NTP server aggressively 
>>>> and then steer the oscillator after it. I haven’t used it in production, 
>>>> but it worked a lot better than it sounded like it would.  (In other 
>>>> words, even without GPS it’s a better time server than most systems).
>>>>
>>>>
>>>> Ask
>>
>> -- 
>> Harlan Stenn 
>> http://networktimefoundation.org - be a member!

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NTP question

2019-05-02 Thread Harlan Stenn



On 5/2/2019 9:13 AM, James R Cutler wrote:
>> On May 2, 2019, at 10:59 AM, William Herrin > <mailto:b...@herrin.us>> wrote:
>>
>> On Wed, May 1, 2019 at 7:03 PM Harlan Stenn > <mailto:st...@nwtime.org>> wrote:
>>
>> It's not clear to me that there's anything *wrong* with using the
>> pool,
>> especially if you're using our 'pool' directive in your config file.
>>
>>
>> The one time I relied on the pool I lost sync a year later when all
>> three servers the configuration picked withdrew time services and the
>> still-running ntp client didn't return to the names to find new ones.
>> Wonderful if that's fixed now but the pool folks argued just as
>> strongly for using it back then.
>>
>> Also, telling the security auditor that you have no idea who supplies
>> your time source is pretty much a non-starter. You can convince them
>> of a lot of things but you can't convince them it's OK to have no idea
>> where critical services come from.
>>
>> That's what's wrong with the pool.
>>
>> Regards,
>> Bill Herrin
>>
>>
>> -- 
>> William Herrin  her...@dirtside.com
>> <mailto:her...@dirtside.com>  b...@herrin.us <mailto:b...@herrin.us>
>> Dirtside Systems . Web: <http://www.dirtside.com/>
> 
> I have only ever used the pool as a supplement to other servers. Here is
> a snippet from ntp.conf that was found in the bottom of a locked filing
> cabinet stuck in a disused lavatory with a sign on the door saying
> 'Beware of the Leopard.’ *
> 
> #External Time Synchronization Source Servers
> #
> servertick.usno.navy.mil# open access
> servertime.apple.com <http://time.apple.com># open access
> serverTime1.Stupi.SE# open access
> serverntps1-0.uni-erlangen.de <http://ntps1-0.uni-erlangen.de># open
> access
> server0.pool.ntp.org <http://0.pool.ntp.org># open access
> server1.pool.ntp.org <http://1.pool.ntp.org># open access
> server2.pool.ntp.org <http://2.pool.ntp.org># open access

I recommend you replace the above 3 lines with:

 pool CC.pool.ntp.org

where CC is an appropriate country code or region.

H
--
> servernist1-nj2-ustiming.org <http://nist1-nj2-ustiming.org># open
> access
> servernist1-chi-ustiming.org <http://nist1-chi-ustiming.org># open
> access
> servernist1-pa-ustiming.org <http://nist1-pa-ustiming.org># open access
> #
> 
> 
> I have not kept up with pool changes since then.
> 
> *Apologies to Douglas Adams

-- 
Harlan Stenn, Network Time Foundation
http://nwtime.org - be a Member!


Re: NTP question

2019-05-02 Thread Harlan Stenn



On 5/2/2019 7:59 AM, William Herrin wrote:
> On Wed, May 1, 2019 at 7:03 PM Harlan Stenn  <mailto:st...@nwtime.org>> wrote:
> 
> It's not clear to me that there's anything *wrong* with using the pool,
> especially if you're using our 'pool' directive in your config file.
> 
> 
> The one time I relied on the pool I lost sync a year later when all
> three servers the configuration picked withdrew time services and the
> still-running ntp client didn't return to the names to find new ones.
> Wonderful if that's fixed now but the pool folks argued just as strongly
> for using it back then.

Were you using 'server' entries in your ntp.conf file or a 'pool' directive?

> Also, telling the security auditor that you have no idea who supplies
> your time source is pretty much a non-starter. You can convince them of
> a lot of things but you can't convince them it's OK to have no idea
> where critical services come from.

I'm not saying you *should* use the pool, or that you should *only* use
the pool.  The pool *can* be used responsibly.  And I suspect Ask and
his crew have documented things well enough that you could point an
auditor at the docs for the 'pool' directive and the monitoring efforts
that the Pool does, and between that and peering with your other
internal S2 sites and some well-chosen external site and perhaps some
local refclocks you would be in fine shape.

> That's what's wrong with the pool.
> 
> Regards,
> Bill Herrin
> 
> 
> -- 
> William Herrin ........ her...@dirtside.com
> <mailto:her...@dirtside.com>  b...@herrin.us <mailto:b...@herrin.us>
> Dirtside Systems . Web: <http://www.dirtside.com/>

-- 
Harlan Stenn, Network Time Foundation
http://nwtime.org - be a Member!


Re: Paging anyone from ntpd.org

2019-12-31 Thread Harlan Stenn
On 12/30/2019 8:32 PM, Seth Mattinen wrote:
> On 12/30/19 8:22 PM, Seth Mattinen wrote:
>> Is anyone from ntpd.org on here? You're pointing DNS at me for some
>> reason. That zone (ntpd.org) isn't in our system. Your NS looks odd
>> too, *.darkness-reigns.net and .nl? Is that legit? I don't know what
>> it was before because I've never looked, but that seems off.
>>
>>
> 
> nevermind, I'm tired and confused ntpd.org with ntp.org. Just going to
> wildcard *.ntpd.org to 127.0.0.1 and go back to sleep.

I did think about replying, saying "Just to be clear, this isn't about
ntp.org."

-- 
Harlan Stenn, Network Time Foundation
http://nwtime.org - be a Member!


Re: Paging anyone from ntpd.org

2019-12-31 Thread Harlan Stenn
On 12/31/2019 7:21 AM, Seth Mattinen wrote:
> On 12/31/19 1:32 AM, Harlan Stenn wrote:
>> On 12/30/2019 8:32 PM, Seth Mattinen wrote:
>>> On 12/30/19 8:22 PM, Seth Mattinen wrote:
>>>> Is anyone from ntpd.org on here? You're pointing DNS at me for some
>>>> reason. That zone (ntpd.org) isn't in our system. Your NS looks odd
>>>> too, *.darkness-reigns.net and .nl? Is that legit? I don't know what
>>>> it was before because I've never looked, but that seems off.
>>>>
>>>>
>>>
>>> nevermind, I'm tired and confused ntpd.org with ntp.org. Just going to
>>> wildcard *.ntpd.org to 127.0.0.1 and go back to sleep.
>>
>> I did think about replying, saying "Just to be clear, this isn't about
>> ntp.org."
>>
> 
> 
> What I did learn though there are a lot of people configuring their NTP
> with servers that are identical to the legitimate *.ntp.org names,
> except they're mistyping ntpd instead of ntp. Enough to generate >2Gbps
> worth of query traffic (pointed at a DNS server with a 1gbps interface).
> 
> I have to admit I'm kind of curious how many unique clients that would
> be if I answered back with a working IP address instead of localhost.

If the folks who registered ntpd.org are OK with it, we'd be happy to
take that domain over and do right by it.

-- 
Harlan Stenn, Network Time Foundation
http://nwtime.org - be a Member!


Re: NIST NTP servers

2016-05-10 Thread Harlan Stenn
Leo Bicknell writes:
> ...
> 
> The correct answer here is to run multiple NTP servers in your
> network.  And by servers I mean real servers, with good quality
> oscellators on the motherboard.  Then configure them to talk to
> _many_ sources.  You need 4 sources of time minimum to redundantly
> detect false tickers.  If you're serious about it then find ~10
> Stratum 1 sources (ideally authenticated and from trusted entities),

Byzantine General's problem.

With 3 sources you can detect *1* false ticker.

But if one of those becomes unreachable you only have 2 time sources.
Dilemma.

With 4 sources you run the risk of 2 going one way, and 2 going another
way.  This happened to several folks recently, when some sites put NTP
servers on the 'net that offered leap-smeared time.  That's really a
different problem where one of the effects is that it causes "time
islands".

> one of which could be GPS as several have suggested.  You'll then
> have high quality false ticker rejection.

For extra points, use GPS receivers from different manufacturers, using
whatever "variety" you can get for all of the components involved.

Are you mounting each GPS receiver inside a coffee can to prevent
drive-by jamming?

Are the cables properly grounded?  Using gas discharge tubes?
Periodically tested/inspected?

How much fun do you want to have thinking about all of these cases?

> Configure all of your devices to get NTP from the servers you run
> using authentication.

Yes, and properly monitor your ntpd instances.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NIST NTP servers

2016-05-11 Thread Harlan Stenn
Sharon Goldberg writes:
> Well, if you really want to learn about the NTP servers a target is using
> you can always just sent them a regular NTP timing query (mode 3) and just
> read off the IP address in the reference ID field of the response (mode 4).

Unless the server is an IPv6 server.  This trick only works for IPv4.

And we have a fix for all of this that will be out soon.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: NIST NTP servers

2016-05-11 Thread Harlan Stenn
Harlan Stenn writes:
> Sharon Goldberg writes:
> > Well, if you really want to learn about the NTP servers a target is using
> > you can always just sent them a regular NTP timing query (mode 3) and just
> > read off the IP address in the reference ID field of the response (mode 4).
> 
> Unless the server is an IPv6 server.  This trick only works for IPv4.
> 
> And we have a fix for all of this that will be out soon.

Also, the attacker will need to know the correct origin timestamp for
the brief window where that attack will work, and even if this happens
either the client or the server will see syslog entries alerting to the
abuse (if folks are running new enough versions of ntpd).

H


Re: Leap Second planned for 2016

2016-07-08 Thread Harlan Stenn


On 7/8/16 4:47 PM, Saku Ytti wrote:
> On 9 July 2016 at 02:27, Jared Mauch  wrote:
>> Time is actually harder than it seems. Many bits of software break in 
>> unexpected ways. Expect the unexpected.
> 
> Aye. How many have written code like this:
> 
> start = time();
> do_something();
> elapsed = time() - start;
> 
> Virtually all code dealing with passage of time assumes time moves
> only forward, I'm amazed we don't see more issues during leap seconds.
> Portable monotonic time isn't even available in many languages
> standard libraries.
> 
> Hopefully they'll decide in 2023 finally to get rid of leap seconds
> from UTC. Then GPS_TIME, TAI and UTC are all same with different
> static offset.

How about you run your systems on TAI or satellite time?

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Yet another NTP security bug we fixed before the CVE issued

2016-10-28 Thread Harlan Stenn
"Eric S. Raymond" writes:
> ...

Yawn.  We disabled interleave a while ago.

Interleave is the best way to get the next major step in accurate time
using the NTP Protocol.  Yes, it needs work.  A reference implementation
is where this work happens.

Yes, we have another release about to happen.  Mostly "security" bugs
that folks will not see, if they're being at all responsible.

Eric, you are loved and appreciated, and respected and admired.

--
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: Recent NTP pool traffic increase

2016-12-20 Thread Harlan Stenn


On 12/20/16 7:27 PM, Laurent Dumont wrote:
> I do think that the point of the Pool network is to be used by both
> consumers and vendors. And as mentioned before, there is a process if
> you are a vendor and want to use the pool within a commercial product. I
> have 3 NTP servers running and I don't really care who is using it.
> 
> That said, setting up your own infrastructure is also worth considering
> if it's a business critical feature. I assume that a Snapchat app that
> fails to have accurate time or correct itself could be abused.
> 
> To be honest, the fact that NTP is still something managed by volunteers
> and not a regulated entity (a bit like DNS) is mind boggling.

Time *is* managed by regulated entities - the National Time Labs.

And Network Time Foundation's NTP Project (the reference implementation
for NTP) could do lots more if we had a useful budget.

Folks pay money for DNS registrations.  There's no revenue stream around
"time".

Help us get enough support to NTF, and we'll have the staff and
infrastructure to do more for folks.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Recent NTP pool traffic increase

2016-12-20 Thread Harlan Stenn


On 12/20/16 9:21 PM, Royce Williams wrote:
> On Tue, Dec 20, 2016 at 8:19 PM, Royce Williams  
> wrote:
>> On Tue, Dec 20, 2016 at 8:04 PM, Yury Shefer  wrote:
>>>
>>> Google announced public NTP service some time ago:
>>> https://developers.google.com/time/
>>
>> Leap smearing does look interesting as way to sidestep the
>> potentially-jarring leap-second problem ... but a note of caution.
>>
>> I've had multiple time geeks tell me that leap-smearing is pretty
>> different from strict-RFC NTP, and Google themselves say on that page:
>>
>> "We recommend that you don’t configure Google Public NTP together with
>> non-leap-smearing NTP servers."
>>
>> So it looks like we shouldn't mix and match. And since most folks
>> should probably want some heterogeneity in their NTP, it may be a
>> little premature to jump on the leap-smear bandwagon just yet.
>>
>> I'm vague on the details, so I could be wrong.
> 
> This is informative:
> 
> https://docs.ntpsec.org/latest/leapsmear.html
> 
>> Does anyone know of any other (non Google) leap-smearing NTP implementations?

The NTP Project has had a leap-smear implementation for a while.

We also have a proposal for a REFID that indicates the provided time is
a leap-smear time, and Network Time Foundation is working on a new
timestamp format and API that will easily allow time exchange between
systems using different timescales.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Recent NTP pool traffic increase

2016-12-22 Thread Harlan Stenn


On 12/22/16 4:11 PM, Ask Bjørn Hansen wrote:
>> On Dec 20, 2016, at 8:02 PM, Harlan Stenn 
>> wrote:
>> 
>>> On 12/20/16 7:27 PM, Laurent Dumont wrote: To be honest, the fact
>>> that NTP is still something managed by volunteers and not a
>>> regulated entity (a bit like DNS) is mind boggling.
>> 
>> Time *is* managed by regulated entities - the National Time Labs.
> 
> That was pretty clearly not what Laurent was talking about.

Not all that clearly, at least to me.

>> And Network Time Foundation's NTP Project (the reference
>> implementation for NTP) could do lots more if we had a useful
>> budget.
>> 
>> Folks pay money for DNS registrations.  There's no revenue stream
>> around "time".
>> 
>> Help us get enough support to NTF, and we'll have the staff and 
>> infrastructure to do more for folks.
> 
> What does the NTF have to do with the NTP Pool (or the “recent NTP
> pool traffic increase”)?

Nothing.  But it has to do with companies putting NTP into their
products.  When they do this with problematic configurations, it causes
trouble.  In this case, it was trouble for the Pool project.

The NTP Pool project certainly isn't the place to solve this issue.

> The NTP Pool is run by volunteers, as you very well know. Both the
> management and DNS system and the thousands of people who contribute
> their NTP service to the system. (And we manage on a pretty scarce
> budget).

What's your point?

This sort of misconfiguration will happen and the NTP Pool Project
clearly isn't the place to solve this problem overall.  It *is*
something NTF is in a position to address.

And we're almost exclusively an overstretched volunteer organization,
too, as you very well know.

Do we have different goals around this issue?

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Recent NTP pool traffic increase

2016-12-22 Thread Harlan Stenn


On 12/22/16 5:25 PM, Royce Williams wrote:
> On Thu, Dec 22, 2016 at 4:05 PM, Harlan Stenn  wrote:
> 
>> This sort of misconfiguration will happen and the NTP Pool Project
>> clearly isn't the place to solve this problem overall.  It *is*
>> something NTF is in a position to address.
> 
> Harlan, could you be more specific about how NTF can address this?
> Would it require modification of the NTP protocol, or something else?

Network Time Foundation has two projects to directly help here.

One is a Certification and Compliance program.

The other is a project to analyze/produce BCP-compliant ntp.conf files.

Due to limited resources we're making slow progress on each of these.
That's the backwards way of saying we can make much more useful progress
on these and other issues (like the development of NTPv5 and the General
Timestamp API) if we can get useful support.

With more support we can also make more pool servers available.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Recent NTP pool traffic increase (update)

2016-12-25 Thread Harlan Stenn
Hi Fujimura-san,

On 12/24/16 6:11 AM, FUJIMURA Sho wrote:
> Hello,
> 
> I know 133.100.9.2 and 133.100.11.8 are listed.
> The Server Contact is old information.
> So, I sent e-mail to webmas...@ntp.org a few times.
> But, I have't received e-mail from them.
> I'd like them to change the information.
> Is there the person knowing the contact information to ntp.org?

I don't recall seeing the emails you sent to webmaster, but we do have a
new group of folks watching the Servers web.  We would be happy to work
with you to give you access to those entries so you can update them.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Recent NTP pool traffic increase

2016-12-30 Thread Harlan Stenn


On 12/30/16 11:26 AM, Emille Blanc wrote:
> Ah, but who do you trust? Trump, Putin, or Xi's clock?
> 
> That said, we use a Stratum2 clock for our AS, which syncs using GPS
> at $dayjob. So... I guess we trust Trump's clock.
> 
> Perhaps there's a market for a device that takes GPS, GLONASS, and
> Beidou, and references the three for sanity checks in the event of
> $unforseen_circumstance. Assuming such a thing were possible -
> admittedly I know little about GLONASS, and even less about Beidou.

Why are you trying to re-invent a properly configured S2 NTP server?

H
--
> "Perhaps some kind of death clock?"
> 
> -Original Message- From: NANOG
> [mailto:nanog-bounces+emille=abccommunications@nanog.org] On
> Behalf Of Allan Liska Sent: December-30-16 11:09 AM To: Majdi S.
> Abbas; Laurent Dumont Cc: nanog@nanog.org Subject: Re: Recent NTP
> pool traffic increase
> 
> 
> On 12/30/2016 at 1:20 PM, "Majdi S. Abbas"  wrote:On Thu, Dec 22,
> 2016 at 11:31:08PM -0500, Laurent Dumont wrote:
>> What I mostly meant is that there should be a regulated,
> industry-wide
>> effort in order to provide a stable and active pool program. With
> the
>> current models, a protocol that is widely used by commercial
>> devices
> is
>> being supported by the time and effort of volunteers around the
> world.
> 
> Who's authoritative for time? Even the national labs aren't -- UTC is
> figured well after the fact.
> 
> In the United States that would the United States Naval Observatory 
> (USNO) Master Clock (http://tycho.usno.navy.mil/).  You can read
> more about it here: 
> http://motherboard.vice.com/read/demetrios-matsakis-and-the-master-clock
>
>  allan
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Temperature monitoring

2017-07-13 Thread Harlan Stenn

On 7/13/17 7:33 PM, Dovid Bender wrote:
> All,
> 
> We had an issue with a DC where temps were elevated. The one bit of
> hardware that wasn't watched much was the one that sent out the initial
> alert. Looking for recommendations on hardware that I can mount/hang in
> each cabinet that is easy to set up and will alert us if temps go beyond a
> certain point.
> 
> TIA.
> 
> Dovid

Are you running ntpd on your boxes?  See what happens when you plot its
drift against other temperature sensors, the closer to the clock chip
the better.

If you do this on enough boxes, you should have an easy time seeing what
happens on boxes where you have an easier time watching ntpd's drift
value than you have watching a nearby dedicated temperature sensor.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: OpenNTPProject.org

2014-02-17 Thread Harlan Stenn
Kate Gerry writes:
> Just add these to your ntp.conf configuration then restart the service: (Wo=
> rks with all default installations that I've found)
> 
> restrict default kod nomodify notrap nopeer noquery
> restrict -6 default kod nomodify notrap nopeer noquery

KOD only works with "limited" in the release of NTP you are using.

H



Re: OpenNTPProject.org

2014-02-17 Thread Harlan Stenn
If somebody has contacts at Juniper who is involved in this, I'd like to
get their contact information.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



NTP DRDos Blog post

2014-02-19 Thread Harlan Stenn
Folks,

I just posted http://nwtime.org/ntp-winter-2013-network-drdos-attacks/ .

In general we've never allowed comments to blog posts on that site;
we're currently discussing if we should allow them for this post.

I'd love to hear any feedback about the post.

Thanks...

-- 
Harlan Stenn 
http://networktimefoundation.org  - be a member!



Re: Filter NTP traffic by packet size?

2014-02-21 Thread Harlan Stenn
"Dobbins, Roland" writes:

> Operators are using this size-based filtering to effect without
> breaking the world.

As a reality check, with this filtering in place does "ntptrace" still
work?

H



Re: Net Neutrality...

2014-07-15 Thread Harlan Stenn
Brett Glass writes:
> At 12:19 PM 7/15/2014, Barry Shein wrote:
> 
> >There exists a low and high (practical) bandwidth range within which
> >it simply doesn't make any difference to a given business model.
> 
> Very true. And there's another factor to consider.
> 
> Estimates of the maximum bandwidths of all the human senses, combined,
> range between the capacity of a T1 line (at the low end) and
> about 4 Mbps (at the high end). A human being simply is not wired to
> accept more input. (Yes, machines could digest more... which means that
> additional bandwidth to and from the home might be useful for the purpose
> of spying on us.) What does this imply about the FCC's proposal to
> redefine "broadband" as a symmetrical 10 Mbps?

For single-person households, nefarious things.

For households (or small businesses) things change.  And while most
folks will not need those uplink speeds, for others it can be real
useful.

And yes, there is room for abuse.

H


Re: Muni Fiber and Politics

2014-07-21 Thread Harlan Stenn
Greg Walden (R-OR) is similarly funded by the cable and telecom folks,
and is also loud and clear that he thinks we should forget about net
neutrality and let the companies do what is best.

H


Security release scheduling

2015-09-28 Thread Harlan Stenn
I'm looking for some general "calendar" help to use for our security
release scheduling process.  Something that usefully accounts for
clients all over the world.

By "usefully accounts" I mean that we want to be able to have reasonable
confidence that we're not going to pick a public release date that is a
national holiday for one country, and we're also not going to avoid a
date because it's "let's order pizza" day somewhere else, but the
purpose of the holiday is obscured because of language translation issues.

I figure this is something others must have solved, and I'm hoping some
folks on this list might be able to offer me some pointers.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Security release scheduling

2015-09-29 Thread Harlan Stenn


On 9/28/15 11:08 PM, Mark Andrews wrote:
> In message <560a13e6.7060...@nwtime.org>, Harlan Stenn writes:
>> I'm looking for some general "calendar" help to use for our security
>> release scheduling process.  Something that usefully accounts for
>> clients all over the world.
>>
>> By "usefully accounts" I mean that we want to be able to have reasonable
>> confidence that we're not going to pick a public release date that is a
>> national holiday for one country, and we're also not going to avoid a
>> date because it's "let's order pizza" day somewhere else, but the
>> purpose of the holiday is obscured because of language translation issues.
>>
>> I figure this is something others must have solved, and I'm hoping some
>> folks on this list might be able to offer me some pointers.
> 
> There's a national holiday basically everyday of the year.
> 
> http://www.timeanddate.com/holidays/

Thanks, Mark!

So much for that idea...

I guess the best we can hope for is to minimize the impact.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Security release scheduling

2015-09-29 Thread Harlan Stenn
Good info, Barry - thanks!

I appreciate your offer, too!

H
--

On 9/29/15 12:39 AM, Barry Greene wrote:
>>
>> Hi Harlan,
> 
> The general principle is look out for the major network lock downs. Some 
> times that is overlap with holidays. Other times it is over financial close 
> months.
> 
> My personal $.02 is to avoid major vulnerability disclosures in December, 
> during Lunar New Year weeks, during Ramadan, and June. Some would also 
> include August (Euro holidays).
> 
> But these days there are timers given by the vulnerability finder (or CERT 
> Team) and conference disclosures (security rock stars) that drive the 
> disclosure to a time which is not optimal to the people who have to roll out 
> the remediation. 
> 
> In essence, write a disclose policy, put it on your website, and be open for 
> improvements based on input from your constituents. Do your best. That is all 
> your can do.
> 
> Barry
> 
> PS - Let me know if you need help writing the disclosure policy. 
> 
> 
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Advance notice - H-root address change on December 1, 2015

2015-11-16 Thread Harlan Stenn


On 11/16/15 4:55 PM, Jared Mauch wrote:
> This action by red hat is nice from a stability perspective but
> infuriates many standards derived folks like ISC/BIND and NTP amongst
> others as a version number means something to them.
> 
> This dialogue is typically broken from both sides as expectations are
> different and bug reports get lost between the OS packaging and the
> supplier packaging. Sometimes this is good other times it can be
> quite bad.
> 
> I would prefer to see fewer variants and better bug fixes across the
> board but the enterprise side often want a specific version number
> and expect fixes that the upstream maintainers don't want to keep the
> same version numbering for "that fix" or add a stealth feature and
> red hat may not want to pick it up...
> 
> Not saying who is right or wrong but these views sometimes drive the
> intractable situation where 4.2.6 is shipped for NTP from red hat (as
> example) but it is EOL from the NTP.org folks.

Red Hat has known for YEARS that we only have the resources to support
one stable code branch, and that if they want support for older versions
we can offer that at cost.

Nobody has ever approached us about support for older releases of NTP.

The folks who scream the loudest about our not supporting older releases
are the folks who charge their customers money for support.  These same
companies do nothing to support us.

Anybody can see the list of companies that support NTP at:

 http://nwtime.org/current-members-donors/

The free software companies listed there do not give us any money.

>> On Nov 16, 2015, at 7:16 PM, Mark Andrews  wrote:
>> 
>> The point of putting out maintainence releases is to fix bugs in 
>> the existing code not to introduce features.  We leave features to 
>> the .0 releases.  The [func] below are bug fixes / security fixes.
>> 
>> Even with 60% of the changes one is missing a huge number of bug 
>> fixes.

In NTP's case, we fixed over 1100 things between 4.2.6 and 4.2.8.

Skippy
(Harlan'e evil twin brother)



Re: BCOP appeals numbering scheme -- feedback requested

2015-03-15 Thread Harlan Stenn
Rob Seastrom writes:

> The wiki/living document approach others have suggested seems like a
> poor one to me, for the same reason that I dislike the current trend
> of "there's no release tarball, major release, point release, or
> regression testing - just git clone the repository" in free software
> development.

And I like wikis for some things, here it might work (I haven't looked)
and I still do release tarballs with version numbers and some (we're
actively adding more) regression/unit/functional testing.

> Releng is hard and thankless

:)

> but adds enormous value and
> serves as a forcing function for some level of review, cursory though
> it may be.

I think so too.

Hey everybody, please support Network Time.  Spread the word.  OK, I said it.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: Supporting network time software development/maintenance (was: Re: BCOP appeals numbering scheme -- feedback requested)

2015-03-16 Thread Harlan Stenn
Rob Seastrom writes:
> New subject so as to minimize threadjacking, not the least because
> this is important stuff.
> 
> Harlan Stenn  writes:
> 
>>> Releng is hard and thankless but adds enormous value and
>>> serves as a forcing function for some level of review, cursory though
>>> it may be.
>>
>> I think so too.
>>
>> Hey everybody, please support Network Time.  Spread the word.  OK, I
>> said it.
> 
> The check, as we say, is in the mail (literally).

Very  much appreciated!

> I wish I'd known about Network Time Foundation before you and I
> started corresponding a little over a week ago about GPS cores.
> 
> > Harlan Stenn 
> > http://networktimefoundation.org - be a member!
> 
> NANOG colleagues, I know it can be hard getting the employer to pony
> up for organizations like this, but if correct timestamps in your logs
> and being able to correlate your packet captures are something you
> find personally valuable and sanity-preserving, you might consider an
> individual membership.  I know it's pretty important to me...
> 
> http://nwtime.org/individual-membership-application/

And Sue Graves is working with NTF to help with all of this, so if there
is anything we can do to help show value to your employers please let
her know.

The individual donations are great - they've quickly added a bit over 2
weeks' time to the "financial clock" regarding my "full time" efforts
(apparently my definition of full time is a bit unusual).  Please help
keep those coming in.

it's going to take Institutional members to provide the more significant
resources NTF needs to bring the bigger goals on-line, things like even
faster NTP development, completing Ntimed, getting the General Timestamp
API spec'd and implemented, and our Certification and Compliance
programs operational:

 http://nwtime.org/membership
 http://nwtime.org/join
 http://nwtime.org/projects

We've heard from some institutions that they'll be joining us, but
nothing has happened there yet.

Thanks a bunch, folks!

Please keep spreading the word.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: [SECURITY] Application layer attacks/DDoS attacks

2015-05-23 Thread Harlan Stenn
Just to ask, what is the expected effect on DDoS attacks if folks
implemented BCP38?

How does the cost of implementing BCP38 compare to the cost of other
solution attempts?

H


Re: REMINDER: LEAP SECOND

2015-06-19 Thread Harlan Stenn
Saku Ytti writes:
> Hopefully this is last leap second we'll ever see. Non-monotonic time
> is an abomination and very very few programs measuring passage of time
> are correct.  Even those which are, usually are not portable, most
> languages do not even offer monotonic time in standard libraries.
> Canada, China, England and Germany, shame on you for opposing
> leapsecondless UTC.

It's a problem with POSIX, not UTC.

UTC is monotonic.

> Next year hopefully GPSTIME. TAI and UTC are the same thing, with different
> static offset.

The General Timestamp API that Network Time Foundation is working on can
solve this problem.  People use different timescales for different
reasons.  The Agile folks like the "pigs and chickens" analogy: in a
bacon and egg breakfast, the chicken is invested while the pig is
committed.

It's lame for a chicken to dictate to a pig.

It's lame to change an existing Standard.  Leave that one alone and
choose to follow a new/different Standard.

If you don't have a system that can properly handle leapseconds, there
are several solutions to this, including:

- implement DLM's leap second process in the kernel, described over 20
  years ago 
- use the posix-right timezone files
- help Network Time Foundation get the General Timestamp API implemented
  and deployed, which will let folks use whatever timescale they want.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: REMINDER: LEAP SECOND

2015-06-19 Thread Harlan Stenn
Bad idea.

When restarting ntpd your clocks will likely be off by a second, which
will cause a backward step, which will force the problem you claim to be
avoiding.

There are plenty of ways to solve this problem, and you just get to
choose what you want to risk/pay.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: REMINDER: LEAP SECOND

2015-06-19 Thread Harlan Stenn
Baldur Norddahl writes:
> On 19 June 2015 at 23:58, Harlan Stenn  wrote:
> 
> > Bad idea.
> >
> > When restarting ntpd your clocks will likely be off by a second, which
> > will cause a backward step, which will force the problem you claim to be
> > avoiding.
> 
> If you are afraid that your routers will crash due to the leapsecond,
> then it would help to disable the thing that you think will crash
> them. Even if the router crashes when you enable it later on. Because
> then you can have one router crash at a time and have it happen in a
> service window where you are ready for it. Instead of having all
> routers in your whole network crash at exactly the same time.

That' seems fair, as long as you turn off the time stuff only on your
routers, and I'm assuming this is on routers that don't have supported
software.

H


Re: REMINDER: LEAP SECOND

2015-06-20 Thread Harlan Stenn
Mel Beckman writes:
> Harlan,
> 
> This is cisco's recommended workaround, the ultimate conclusion of an exhau=
> stive study of all Cisco firmware and after detailed post mortem analysis o=
> f two previous Leap seconds:
> 
>  https://tools.cisco.com/bugsearch/bug/CSCut33302

Fair enough.  And I've been trying to get Cisco to work with us for very
many years.  They have yet to show any interest.  But they'd be paying
us for that.  We have no leverage with them.

But folks who are paying Cisco for support?  For the number of years
Cisco has been using NTP and for the number of product lines that use
it, they could certainly do better.  I know they were current when I did
the port for the MDS switch line, years ago.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: REMINDER: LEAP SECOND

2015-06-20 Thread Harlan Stenn
shawn wilson writes:
> ... I mean letting computers figure out slower earth rotation on the
> fly would seem more accurate than leap seconds anyway. And then all of
> us who do earthly things and would like simpler libraries could live
> in peace.

Really?  Have you looked in to those calculations, and I'm only talking
about the allegedly predictable parts of those calculations, not things
like the jetstream, the circumpolar currents, or earthquakes.

H


Re: REMINDER: LEAP SECOND

2015-06-22 Thread Harlan Stenn
Tony Finch writes:
> Harlan Stenn  wrote:
> 
> > It's a problem with POSIX, not UTC.
> >
> > UTC is monotonic.
> 
> The problems are that UTC is unpredictable, and it breaks the standard
> labelling of points in time that was used for hundreds (arguably
> thousands) of years before 1972.

You mean back when seconds were rubbery, and before the earth's
rotational speed could be easily and accurately measured, or at least
when the wobbles at that level of accuracy became so noticeable that
they could no longer be ignored?

H


Re: REMINDER: LEAP SECOND

2015-06-22 Thread Harlan Stenn
Doug Barton writes:
> This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
> On 6/19/15 2:58 PM, Harlan Stenn wrote:
>> Bad idea.
>>
>> When restarting ntpd your clocks will likely be off by a second,
>> which will cause a backward step, which will force the problem you
>> claim to be avoiding.
>>
>> There are plenty of ways to solve this problem, and you just get to
>> choose what you want to risk/pay.
> 
> You misunderstand the problem. :) The problem is not "clock skips
> backward one second," because most of the time that's not what
> happens.  The problem is that most software does not handle it well
> when the clock ticks ... :59 :60 :00 instead of ticking directly from
> :59 to :00.

POSIX NEVER shows :60.

> THAT problem is avoided by temporarily turning off NTP and then
> turning it back on again when "the coast is clear." Most software can
> handle the "clock skips forward or backwards one second" problem
> fairly robustly,= and as Baldur pointed out by doing the reset in a
> controlled manner you greatly reduce your overall risk.

Time going backwards is deadly to a number of applications.

But apparently not to applications you care about.

You're also not doing anything where somebody is going to get sued
because a timestamp is off by a second.  There are people for whom this
is a very real risk.

H


Re: REMINDER: LEAP SECOND

2015-06-23 Thread Harlan Stenn
This stuff can make my head explode.

When a leap second is added, like on 30 June 2015 at the last second of
the day, POSIX insists that the day still have 86400 seconds in it.
This makes the day longer by one second, so time has to either slow down
or move backwards.

The "dumb" way to do this is to step the clock back by 1 second at the
instant before the stroke of midnight.

The allegedly better way to do this would be to stop the clock a bit
before midnight, and hold the time for 1 second.  To continue providing
monotonic time, every time somebody says "what time is it" during that
holding period one would want to bump the time by the smallest amount
possible, usually 1 nanosecond (assuming the kernel keeps time in
nanoseconds).

Ideally you wouldn't want to add enough nanoseconds to cause the clock
to roll over into the next day "too early".

But apparently nobody has implemented this, even though Prof. Mills
described it in RFC-i-forget about 20 years ago.

This is mostly because POSIX deals with absolute time and not relative
time.

In the unlikely event of a leap second deletion, there would be no
23:59:59, so when the clock is about to strike 23:59:59 it's OK to add
an extra second to the clock to effectively have the time "jump" from
23:59:58 to 00:00:00.  This is still a monotonic increment in time.

Whatever you decide to do, I recommend you actually test it out to see
if it behaves the way you think it will.  You have a whole week still.

H


Re: NANOG Digest, Vol 89, Issue 24

2015-06-23 Thread Harlan Stenn
Alex Hardie writes:

> Not to inject more confusion - but GPS and NTP are noted in the
> thread... but not PTP (IEEE1588)?

I don't belive PTP generally uses UTC as a timescale.

H


Re: REMINDER: LEAP SECOND

2015-06-23 Thread Harlan Stenn
shawn wilson writes:
> On Jun 23, 2015 6:26 AM, "Nick Hilliard"  wrote:
> >
> 
> >
> > Blocking NTP at the NTP edge will probably work fine for most situations.
> > Bear in mind that your NTP edge is not necessarily the same as your
> network
> > edge.  E.g. you might have internal GPS / radio sources which could
> > unexpectedly inject the leap second.  The larger the network, the more
> > likely this is to happen.  Most organisations have network fossils and ntp
> > is an excellent source of these.  I.e. systems which work away for years
> > without any problems before one day accidentally triggering meltdown
> > because some developer didn't understand the subtleties of clock
> monotonicity.
> >
> 
> NTP causes jumps - not skews, right?

Left to its default condition, ntp will step/jump a change in excess of
128msec.

If you want to slew the clock instead, a 1 second correction will take a
little over 33 minutes' time to apply.

I don't understand why people believe that stopping ntpd for a few
minutes while the leap second is applied will help.  If the system clock
keeps good time, it will *still* be about 1 second ahead when ntpd is
restarted, and that will trigger a backward step which is fatal to a
number of applications.

H


Re: REMINDER: LEAP SECOND

2015-06-23 Thread Harlan Stenn
Matthew Huff writes:
> A backward step is a known issue and something that people are more
> comfortable dealing with as it can happen on any machine with a noisy
> clock crystal.

A clock crystal has to be REALLY bad for ntpd to need to step the clock.

> Having 61 seconds in a minute or 86401 seconds in a day is a different
> story.

Yeah, leap years suck too.

And those jumps around daylight savings time.

H


Re: leap second outage

2015-06-30 Thread Harlan Stenn
Joe writes:
> A leap sec causing issues. For about 40 years now, there have been
> these leap seconds to no real issue. All of these are "go-forwards"

No, they're all "go-backwards" events.  That's no big deal to things
that don't care about monotonic time, or to folks who aren't in
violation of something if their timestamps are off by a second.

What I'm about to say may not be as stupid as it sounds:  The problems
here aren't problems for cases where it's not a problem.  It is a
problem where it *is* a problem.

It's a case where one person's signal is another person's noise.

H


Re: leap second outage

2015-06-30 Thread Harlan Stenn
Mikael Abrahamsson writes:
> This is similar to the jiffycounter wrapping, since this doesn't happen 
> that often, it's not commonly tested for. Good way is to start the jiffy 
> counter so it wraps after 10 minutes of uptime. That way you'll run into 
> any bugs quickly. Either we should abolish the leap second or we should 
> make leap second adjustments (back and forth) on a monthly basis to 
> exercise the code.
> 
> This is a hard sell though...

and it's perversely interesting.  It would even be tolerable when the
difference between UTC and UT1 is such that the insertions and deletions
maintain the +/- .9 s difference.  There would even be enough time to
warn folks about this.

H


Re: leap second outage

2015-07-01 Thread Harlan Stenn
Jimmy Hess writes:
> On Wed, Jul 1, 2015 at 12:38 AM, Mikael Abrahamsson  wrote:
> > quickly. Either we should abolish the leap second or we should make leap
> > second adjustments (back and forth) on a monthly basis to exercise the code
> .
> 
> See  maybe there should some day be building codes for
> commercially marketed software  that provide minimum independent
> formal testing to be done by licensed independent testers,  including
> leap seconds and such. ^_^

And NTF's Certification and Compliance programs are going to do this.
At least as soon as NTF has the resources to get this moving.

> The leap second issues are possibly rare and intermittent,  therefore,
>  having a few per month  is not necessarily giving adequate exposure
> to code paths that may go wrong during an insert/del event.

If they happened every 6 month's time that would be often enough, but
the earth hasn't slowed down that much yet.  There will be enough times
that we could insert or delete one every month and still have |UT-UT1|
be under .9 seconds.

If it was announced that "starting in 6 months' time we'll be inserting
or deleting a leap second every month or so that would give folks enough
time to prep for it, and I'm pretty confident that the leap-second would
soon become a non-event.

> There's never been a negative leap second, only insertions, but how
> deletions are implemented  might expose new bugs, since there hasn't
> been one before,  And you can only have one leap per 24 hours,
> positive or minus,  pick one.

Yup.

> & Shouldn't this kind of 'exercise'  be done  during the QA process
> before releasing new system software,   rather than mucking with clock
> accuracy?

leap second handling is a "mechanism" question.  Which one to choose is
a "policy" question.  IMO, a vendor should provide adequate mechanism.
The customer should get to choose policy.

> There is a recent article with some Leap Second  'stress testing' code:
>   https://access.redhat.com/articles/199563
> 
> 
> Readily available test methods are available,  there ought to be
> little legitimate excuse for anyone writing serious software that has
> long-running processes or threads   not to include  evaluation for
> possible leap second  issues  and other possible clock-related issues
> such as clock stepping, DST, and Year 2038 in their standard smoke
> tests

Yes.  And even so, testing these things takes time and equipment.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!


Re: REMINDER: LEAP SECOND

2015-07-01 Thread Harlan Stenn
Mike Hammett writes:
> It looks to have only affected the CCR line and only those running the
> NTP and not the SNTP package.

Any idea what version of NTP or what their configuration looked like?

H


Re: NTP versions in production use?

2015-07-11 Thread Harlan Stenn
Resending...

On 7/10/15 12:29 PM, Harlan Stenn wrote:
> I'm trying to build a list of the versions of NTP that are in active use
> on various active pieces of network gear.
> 
> I know that Cisco, for example, uses NTP in around 10 different product
> lines, but I don't know what versions of NTP are in current use.
> 
> I'm also curious about the answers here for Juniper and other network
> gear providers.  That would include routers, switches, and other types
> of gear.
> 
> If you have information about this I'd appreciate your letting me know.
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: NTP versions in production use?

2015-07-11 Thread Harlan Stenn
Dovid,

Thanks, and I'm kinda stunned that folks are running such ancient
versions of NTP.

https://support.ntp.org/bin/view/Dev/ReleaseTimeline

4.2.0 was EOL'd in June of 2006, and we've fixed about 3,000 issues in
the codebase since then.

H

On 7/11/15 7:58 PM, Dovid Bender wrote:
> Juniper MX5
> r...@yyy.xx.net> show ntp status
> status=06a4 leap_none, sync_ntp, 10 events, event_peer/strat_chg,
> version="ntpd 4.2.0-a Thu Mar 13 08:29:55 UTC 2014 (1)",
> processor="powerpc", system="JUNOS12.3R6.6", leap=00, stratum=3,
> precision=-18, rootdelay=90.375, rootdispersion=20.620, peer=29748,
> refid=208.75.88.4,
> reftime=d94c5338.ac6565a8  Sat, Jul 11 2015 22:45:12.673, poll=7,
> clock=d94c55ad.b634aa52  Sat, Jul 11 2015 22:55:41.711, state=4,
> offset=-0.428, frequency=2.394, jitter=3.505, stability=0.004
> 
> Juniper EX4200:
> root@> show ntp status
> status=c011 sync_alarm, sync_unspec, 1 event, event_restart,
> version="ntpd 4.2.0-a Sat Jan  5 18:41:34 UTC 2013 (1)",
> processor="powerpc", system="JUNOS11.4R6.6", leap=11, stratum=16,
> precision=-18, rootdelay=0.000, rootdispersion=656381.655, peer=0,
> refid=INIT, reftime=.  Thu, Feb  7 2036  1:28:16.000,
> poll=4, clock=d94c5a40.fa58e5f0  Sat, Jul 11 2015 23:15:12.977, state=0,
> offset=0.000, frequency=0.000, jitter=0.004, stability=0.000
> 
> 
> On Fri, Jul 10, 2015 at 4:30 PM, Harlan Stenn  wrote:
> 
>> Resending...
>>
>> On 7/10/15 12:29 PM, Harlan Stenn wrote:
>>> I'm trying to build a list of the versions of NTP that are in active use
>>> on various active pieces of network gear.
>>>
>>> I know that Cisco, for example, uses NTP in around 10 different product
>>> lines, but I don't know what versions of NTP are in current use.
>>>
>>> I'm also curious about the answers here for Juniper and other network
>>> gear providers.  That would include routers, switches, and other types
>>> of gear.
>>>
>>> If you have information about this I'd appreciate your letting me know.
>>>
>>
>> --
>> Harlan Stenn 
>> http://networktimefoundation.org - be a member!
>>
>>
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: NTP versions in production use?

2015-07-11 Thread Harlan Stenn
We will.  But we're going to be asking them for support for network
time.  Folks like you are probably paying them for support.  They'll
listen more to people like you.

This goes to *all* vendors who embed NTP in their products, we're not
interested in in picking on anybody here.

H
--
On 7/11/15 8:21 PM, Dovid Bender wrote:
> You would need to ask Juniper that
> 
> 
> On Sat, Jul 11, 2015 at 11:17 PM, Harlan Stenn  wrote:
> 
>> Dovid,
>>
>> Thanks, and I'm kinda stunned that folks are running such ancient
>> versions of NTP.
>>
>> https://support.ntp.org/bin/view/Dev/ReleaseTimeline
>>
>> 4.2.0 was EOL'd in June of 2006, and we've fixed about 3,000 issues in
>> the codebase since then.
>>
>> H
>>
>> On 7/11/15 7:58 PM, Dovid Bender wrote:
>>> Juniper MX5
>>> r...@yyy.xx.net> show ntp status
>>> status=06a4 leap_none, sync_ntp, 10 events, event_peer/strat_chg,
>>> version="ntpd 4.2.0-a Thu Mar 13 08:29:55 UTC 2014 (1)",
>>> processor="powerpc", system="JUNOS12.3R6.6", leap=00, stratum=3,
>>> precision=-18, rootdelay=90.375, rootdispersion=20.620, peer=29748,
>>> refid=208.75.88.4,
>>> reftime=d94c5338.ac6565a8  Sat, Jul 11 2015 22:45:12.673, poll=7,
>>> clock=d94c55ad.b634aa52  Sat, Jul 11 2015 22:55:41.711, state=4,
>>> offset=-0.428, frequency=2.394, jitter=3.505, stability=0.004
>>>
>>> Juniper EX4200:
>>> root@> show ntp status
>>> status=c011 sync_alarm, sync_unspec, 1 event, event_restart,
>>> version="ntpd 4.2.0-a Sat Jan  5 18:41:34 UTC 2013 (1)",
>>> processor="powerpc", system="JUNOS11.4R6.6", leap=11, stratum=16,
>>> precision=-18, rootdelay=0.000, rootdispersion=656381.655, peer=0,
>>> refid=INIT, reftime=.  Thu, Feb  7 2036  1:28:16.000,
>>> poll=4, clock=d94c5a40.fa58e5f0  Sat, Jul 11 2015 23:15:12.977, state=0,
>>> offset=0.000, frequency=0.000, jitter=0.004, stability=0.000
>>>
>>>
>>> On Fri, Jul 10, 2015 at 4:30 PM, Harlan Stenn  wrote:
>>>
>>>> Resending...
>>>>
>>>> On 7/10/15 12:29 PM, Harlan Stenn wrote:
>>>>> I'm trying to build a list of the versions of NTP that are in active
>> use
>>>>> on various active pieces of network gear.
>>>>>
>>>>> I know that Cisco, for example, uses NTP in around 10 different product
>>>>> lines, but I don't know what versions of NTP are in current use.
>>>>>
>>>>> I'm also curious about the answers here for Juniper and other network
>>>>> gear providers.  That would include routers, switches, and other types
>>>>> of gear.
>>>>>
>>>>> If you have information about this I'd appreciate your letting me know.
>>>>>
>>>>
>>>> --
>>>> Harlan Stenn 
>>>> http://networktimefoundation.org - be a member!
>>>>
>>>>
>>>
>>
>> --
>> Harlan Stenn 
>> http://networktimefoundation.org - be a member!
>>
>>
> 

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: NTP versions in production use?

2015-07-11 Thread Harlan Stenn
Harlan Stenn writes:
> We will.  But we're going to be asking them for support for network
> time.  Folks like you are probably paying them for support.  They'll
> listen more to people like you.
> 
> This goes to *all* vendors who embed NTP in their products, we're not
> interested in in picking on anybody here.

Network Time doesn't *only* need support from network equipment
providers.

If accurate time is important to you, or you and your customers, please
pitch in.

I've probably strayed offtopic here.  Sorry about that.  But help us anyway.

H
--
> --
> On 7/11/15 8:21 PM, Dovid Bender wrote:
> > You would need to ask Juniper that
> > 
> > 
> > On Sat, Jul 11, 2015 at 11:17 PM, Harlan Stenn  wrote:
> > 
> >> Dovid,
> >>
> >> Thanks, and I'm kinda stunned that folks are running such ancient
> >> versions of NTP.
> >>
> >> https://support.ntp.org/bin/view/Dev/ReleaseTimeline
> >>
> >> 4.2.0 was EOL'd in June of 2006, and we've fixed about 3,000 issues in
> >> the codebase since then.
> >>
> >> H
> >>
> >> On 7/11/15 7:58 PM, Dovid Bender wrote:
> >>> Juniper MX5
> >>> r...@yyy.xx.net> show ntp status
> >>> status=06a4 leap_none, sync_ntp, 10 events, event_peer/strat_chg,
> >>> version="ntpd 4.2.0-a Thu Mar 13 08:29:55 UTC 2014 (1)",
> >>> processor="powerpc", system="JUNOS12.3R6.6", leap=00, stratum=3,
> >>> precision=-18, rootdelay=90.375, rootdispersion=20.620, peer=29748,
> >>> refid=208.75.88.4,
> >>> reftime=d94c5338.ac6565a8  Sat, Jul 11 2015 22:45:12.673, poll=7,
> >>> clock=d94c55ad.b634aa52  Sat, Jul 11 2015 22:55:41.711, state=4,
> >>> offset=-0.428, frequency=2.394, jitter=3.505, stability=0.004
> >>>
> >>> Juniper EX4200:
> >>> root@> show ntp status
> >>> status=c011 sync_alarm, sync_unspec, 1 event, event_restart,
> >>> version="ntpd 4.2.0-a Sat Jan  5 18:41:34 UTC 2013 (1)",
> >>> processor="powerpc", system="JUNOS11.4R6.6", leap=11, stratum=16,
> >>> precision=-18, rootdelay=0.000, rootdispersion=656381.655, peer=0,
> >>> refid=INIT, reftime=.  Thu, Feb  7 2036  1:28:16.000,
> >>> poll=4, clock=d94c5a40.fa58e5f0  Sat, Jul 11 2015 23:15:12.977, state=0,
> >>> offset=0.000, frequency=0.000, jitter=0.004, stability=0.000
> >>>
> >>>
> >>> On Fri, Jul 10, 2015 at 4:30 PM, Harlan Stenn  wrote:
> >>>
> >>>> Resending...
> >>>>
> >>>> On 7/10/15 12:29 PM, Harlan Stenn wrote:
> >>>>> I'm trying to build a list of the versions of NTP that are in active
> >> use
> >>>>> on various active pieces of network gear.
> >>>>>
> >>>>> I know that Cisco, for example, uses NTP in around 10 different product
> >>>>> lines, but I don't know what versions of NTP are in current use.
> >>>>>
> >>>>> I'm also curious about the answers here for Juniper and other network
> >>>>> gear providers.  That would include routers, switches, and other types
> >>>>> of gear.
> >>>>>
> >>>>> If you have information about this I'd appreciate your letting me know.
> >>>>>
> >>>>
> >>>> --
> >>>> Harlan Stenn 
> >>>> http://networktimefoundation.org - be a member!
> >>>>
> >>>>
> >>>
> >>
> >> --
> >> Harlan Stenn 
> >> http://networktimefoundation.org - be a member!
> >>
> >>
> > 
> 
> -- 
> Harlan Stenn 
> http://networktimefoundation.org - be a member!
> 
> 


Re: NTP versions in production use?

2015-07-12 Thread Harlan Stenn
On 7/12/15 11:31 AM, valdis.kletni...@vt.edu wrote:
> On Sun, 12 Jul 2015 10:15:20 -0400, "Mike O'Connor" said:
> 
>> :Thanks, and I'm kinda stunned that folks are running such ancient
>> :versions of NTP.
>>
>> I suggest you get accustomed to being stunned.
> 
> He obviously didn't see my post a few weeks back about hosts that were
> looking for an NTP server that went out of service back in 1999. And yes,
> some were still using NTP v1 and v2.
> 
> There's a *lot* of stuff on very serious autopilot out there

I did see it, and I was assuming it was a "local" configuration problem.
 This is "death by 1,000 cuts" and when I wrote my recent query I was
looking for the big offenders.

To me this situation goes hand-in-hand with the problems getting bcp38
deployed, and what Dan Geer talked about in his keynote speech at Black
Hat 2014:

 http://www.youtube.com/watch?v=nT-TGvYOBpI

I get that some folks have real problems with their build systems and
it's hard to upgrade software tools in that environment.  I know it's
can be expensive to solve that problem.  I'd love to find a way to have
the "versioned tool chain" stuff that I implemented at Cisco/Andiamo be
generally available, but I haven't found that many folks willing to
support it yet and I just don't have the spare cycles to add that to my
"do it for free" pile.

I do know that if more companies were to use this sort of tool that the
argument of "we can't patch older releases because we don't have those
tools anymore and the Q/A process becomes horribly expensive"  goes
away.  And that also means that it's far less expensive and therefore
far more profitable to offer maintenance support on older software
releases for much longer periods of time.  But I must be missing
something here as well, as I was never able to make headway with this
idea when I was at Cisco.
-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



signature.asc
Description: OpenPGP digital signature


Re: Did *bufferbloat* cause the 2010 flashcrash?

2015-08-06 Thread Harlan Stenn
In 8/6/15 10:44 AM, William Herrin wrote:
> The intermediate cause of the problem was propagation delay (including
> buffer bloat) which induced an oscillating set of states in the
> trading software.
> 
> The root cause was a flipping jassack trying to out-time his
> competitors by assuming a degree of instantaneity which proved untrue.
> Don't do that. Don't make assumptions about network timing. You can
> count on being wrong. If timing matters to your application, find a
> way to continuously measure.

Similar things happen when folks decide they are going to twiddle the
knobs of NTP's behavior.  NTP works locally, and gets/provides
information globally.  More or less.  When folks decide to make a change
in its core behavior, the usually don't consider how those changes will
affect anybody else.

I know enough about this to know I don't know anywhere near enough about
it, so I leave the knobs alone.

-- 
Harlan Stenn 
http://networktimefoundation.org - be a member!



Re: Small Internet border router options?

2024-05-13 Thread Harlan Stenn via NANOG

On 5/13/2024 12:45 PM, Jean Franco wrote:

Hi Tom.

Ubiquiti EdgeRouter Infinity.


What version of firmware are you using?

We have never seen our box (an ER-8-XG) route packets for more than 
about an hour before it falls over.


If you have having better luck with this and would be open to helping 
us, please let me know - we'd greatly appreciate it.



Best regards,

On Mon, May 13, 2024 at 3:54 PM Tom Samplonius <mailto:t...@samplonius.org>> wrote:



   What are using for small campus border routers?  So four to eight
10G ports with a FIB for full scale L3?


Tom


--
Harlan Stenn 
https://www.nwtime.org/ - be a member!