Re: Is python2 dead?

2023-09-15 Thread Eric S. Raymond via devel
Hal Murray via devel : > Do you have any data on Go GC times? Yes. They're pretty miniscule. Most Go GC is performed concurrently with normal program execution, except for one stop-the-world phase that typically runs on the close order of 1ms for real production programs.

Re: Is python2 dead?

2023-09-15 Thread Eric S. Raymond via devel
Hal Murray : > Maybe it's time to switch to Go? I've thought about it. It shouldn't be all that difficuly. I wrote a tol that would help: https://gitlab.com/esr/pytogo > How long would it take us to rewrite, from scratch, everything in ntpclients? Around three man-monts is my estimate. > I

Re: Is python2 dead?

2023-09-15 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > > Maybe it's time to switch to Go? > > Please, no. Go is a garbage collected language. Just what NTPsec does > not need, random, unpredictable delays. We're only takling client-side as yet. -- http://www.catb.org/~esr/;>Eric S. Raymond

Re: Is python2 dead?

2023-09-11 Thread Eric S. Raymond via devel
Hal Murray via devel : > Really really dead? Or maybe just hiding in some dark corner? Python 2 was end-of-lifed on 1 Jan 2020. It looks pretty dead from where I'm sitting, but I'm aware that people who run RHEL have a different opynion. > Should we drop support for python2 as part of the

Test #2

2022-03-24 Thread Eric S. Raymond via devel
Checking to make sure I've resubscribed. -- http://www.catb.org/~esr/;>Eric S. Raymond ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Python - hard to re-aquire

2021-07-09 Thread Eric S. Raymond via devel
Hal Murray : > > > I'm pretty sure this is a problem with the ntpq code, not with Python - > > Python in general has a reputation for being *easy* to read six months > > later, > > which I think is deserved. It's one of the first things I noticed when I > > started coding in Python back in 1998

Re: Using Go for NTPsec

2021-07-09 Thread Eric S. Raymond via devel
Hal Murray : > More topics for this discussion: > > What platforms is the new environment supported on? See my reply to Sanjeev > Gupta's message. > > As far as I can tell, we don't have a list of supported/tested platforms. Is > there an official we page that describes what we support? (I'm

Re: Using Go for NTPsec

2021-07-08 Thread Eric S. Raymond via devel
Hal Murray : > Thanks for taking the time to explain things to me. Why would I not? It's *good* to have someone on the projects who's sufficiently smart and stubborn to question my premises - please never stop doing that! I know more about the problems around getting to a memory-safe language

Re: GC timing

2021-07-07 Thread Eric S. Raymond via devel
Hal Murray : > If you pass in a buffer, there is no reason to allocate anything in the case > of a server processing a request so this whole discussion is a wild goose > chase. It's a little more complicated than that, because I was describing the lowest-level recvfrom() in the socket library.

Re: Using Go for NTPsec

2021-07-07 Thread Eric S. Raymond via devel
Hal Murray : > That sounds like the right ballpark. Again, if I were working in this area I > would be writing hack code to generate numbers. It's got to have a buffer > for > each item waiting in the channel. Does it do an alloc/free on each item or > does it avoid that by saving the

Re: GC timing

2021-07-07 Thread Eric S. Raymond via devel
Hal Murray : > > >> That doesn't make sense. Where does your "one second apart" come from? > Why > >> is "currently has 2 threads" interesting? > > When do we poll at a less than one-secpmd interval? Most allocatopmns wo;l; > > ber associated with making a packet fra,e for he send, thn dealing

Re: Using Go for NTPsec

2021-07-07 Thread Eric S. Raymond via devel
Hal Murray : > > You're thinking in C. This is a problem, because mutex-and-mailbox > > architectures don't scale up well. Human brains get overwhelmed at about 4 > > mutexes; beyond that the proliferation of corner cases get to be more than > > the meat can handle. > > I'm missing something.

Re: GC timing

2021-07-07 Thread Eric S. Raymond via devel
Hal Murray : > > > I don't know all those numbers yet. But: given that NTPsec only currently > > has 2 threads and our allocations are typically occuring one second apart or > > less per upstream or downstream, I can't even plausibly *imagine* a Raft > > implementation having lower memory churn

Re: Interleaved Mode (Was: Re: Using Go for NTPsec)

2021-07-06 Thread Eric S. Raymond via devel
Richard Laager via devel : > On 7/5/21 8:38 AM, Eric S. Raymond via devel wrote: > > > There is a close-to-RFC to handle this area. "Interleave" is the > > > buzzword. I > > > haven't studied it. The idea is to grab a transmit time stamp, then > &g

Re: Using Go for NTPsec

2021-07-06 Thread Eric S. Raymond via devel
Hal Murray : > > [timing of GC] > > > which shows their meassured STW pauses are bounded to about 95% by 600us and > > typically less than 400us. This is consistent with other reports I've seen, > > and that's why I took 600us as a worst case STW we're likely to see. > > I didn't see any

Re: Using Go for NTPsec

2021-07-06 Thread Eric S. Raymond via devel
Hal Murray : > You have a new toy. The only tool needed is a simple lock. Oh? What about the concurrent DNS thread we already have? At this point I have two years of heavy experience in Go, so the toy is no longer new. If a better upgrade from C existed, I would know about it - Rust comes

Re: Using Go for NTPsec

2021-07-05 Thread Eric S. Raymond via devel
Hal Murray : > > > We don't have a multithreaded server yet. Worst case we have two threads, > > and only one can ever reach the critical region in question. Don't borrow > > trouble! :-) > > I'm interested in building a server that will keep a gigabit link running at > full speed. We can do

Re: Using Go for NTPsec

2021-07-05 Thread Eric S. Raymond via devel
Hal Murray : > >> 1. packet tx happening right after tx timestamp for server response > > > A) Mitigate window 1 by turning off GC before it and back on after. > > Things get complicated. Consider a multi threaded server. If you have > several busy server threads, can they keep the GC off

Re: Using Go for NTPsec

2021-07-04 Thread Eric S. Raymond via devel
Dan Drown via devel : > Let's talk a bit about what time critical sections are currently in the > code. I think that will help drive the decision about the impact of garbage > collection. > > I haven't looked at ntpsec's codebase lately, so some of this might be out > of date. Please feel free

Re: Using Go for NTPsec

2021-07-04 Thread Eric S. Raymond via devel
Hal Murray : > > Eric said: > > Talk to me about what you think the effect of very occasional stop-the-world > > pauses of 600 microseconds or less would be on sync accuracy. By "very > > occasionally" let's say once every ten minutes or so, that being what I > > think > > is a *very*

Re: Using Go for NTPsec

2021-07-02 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Eric S. Raymond via devel writes: > > Talk to me about what you think the effect of very occasional > > stop-the-world pauses of 600 microseconds or less would be on sync > > accuracy. By "very occasionally" let's say once every ten minut

Re: Using Go for NTPsec

2021-06-30 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Matthew Selsky via devel writes: > > On Tue, Jun 29, 2021 at 04:41:30PM -0400, Eric S. Raymond via devel wrote: > > > >> Well, first, the historical target for accuracy of WAN time service is > >> more than an order of magnitude higher

Re: Using Go for NTPsec

2021-06-30 Thread Eric S. Raymond via devel
Richard Laager via devel : > Not particularly. Presumably it's just because of GPS PPS + good network? Having a good local clock can explaiin it, yes. -- http://www.catb.org/~esr/;>Eric S. Raymond ___ devel mailing list

Re: Support for i386

2021-06-30 Thread Eric S. Raymond via devel
Hal Murray via devel : > There is the 32bit time_t problem. We've got a few more years. I've been thinking forward about that. One of my objectives in the big cleanup was to make the time width easier to change, and now it would be internally. The remaining blocker is that the NTP packet

Re: ntpq, refclocks

2021-06-29 Thread Eric S. Raymond via devel
Hal Murray : > Maybe ntpd should turn into a mega program that parses the config file and > runs a bunch of other programs and/or threads. That's an extremely natural way to partition in Go. Much, *much* easier than trying to pull off the equivalent in C would be. --

Re: Go vs GC

2021-06-29 Thread Eric S. Raymond via devel
Hal Murray : > > Well, first, the historical target for accuracy of WAN time service is more > > than an order of magnitude higher than 1ms. > > Time marches on. We need to do better today, much better. > > NTP is used on LANs. Then we'll need to go to watching for GC pauses and skipping

Re: ntpq, refclocks

2021-06-29 Thread Eric S. Raymond via devel
Hal Murray : > [context is ntpq via shared memory] > > > Any reason not to use Unix-domain sockets and just reuse the current protcol > > handling, except it's not accessible netwide? That might be simpler. > > I hadn't figured it out when I was typing in my previous message, but using >

Re: Using Go for NTPsec

2021-06-29 Thread Eric S. Raymond via devel
Richard Laager via devel : > On 6/29/21 3:41 PM, Eric S. Raymond via devel wrote: > > Well, first, the historical target for accuracy of WAN time service is > > more than an order of magnitude higher than 1ms. > > My two NTP servers are +- 0.1 ms and +- 0.2 ms as mea

Re: Using Go for NTPsec

2021-06-29 Thread Eric S. Raymond via devel
Matthew Selsky : > Our target is < 1 us, even for WAN time service. We would want to > keep/improve this accuracy target. One *microsecond*? Has any version of NTP achieved that kind of accuracy? I don't think we're there. -- http://www.catb.org/~esr/;>Eric S. Raymond

Re: ntpq, refclocks

2021-06-29 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Does anybody have any good ideas on a modern way to handle ntpq/mode 6? > > Background... > > We could split the server side out into a separate process. That leaves a > very tiny attack surface from the network. I think I could do that now > except > for mode 6.

Re: Using Go for NTPsec

2021-06-29 Thread Eric S. Raymond via devel
Sanjeev Gupta via devel : > This is a follow on to Eric's email a few hours ago, I am keeping that > thread clean. > > (The last 3GL I programmed in was Fortran, and not the 77 version. I can > read bash scripts and C pseudo-code) > > The literature I can find speaks of Go GC being improved in

Re: Work plan prpoosal for the next year

2021-06-29 Thread Eric S. Raymond via devel
James Browning via devel : > I do not consider myself an expert C developer. You're good enough to contribute materially to *this* project, which is by no means the easiest C gode to grok. That makes you expert in my book. > I think the proposed schedule is overly serial. ntpkeygen and keygone

Work plan prpoosal for the next year

2021-06-24 Thread Eric S. Raymond via devel
Developers, please weigh in on this so we can finalize it. The final version will become part of a grant proposal which may get us money for a hardware test lab and code bounties. = NTPsec work plan This is a rough-draft work plan for the NTPsec project over the period July 1st 2021 to July 1st

Re: Objectives for the next year

2021-06-18 Thread Eric S. Raymond via devel
MLewis : >Is it worthwhile improving the current C code to a 'hardened' programming >standard?� > >Example >- Joint Strike Fighter standards >[1]https://www.stroustrup.com/JSF-AV-rules.pdf >- NASA JPL standards > >

Re: Objectives for the next year

2021-06-18 Thread Eric S. Raymond via devel
James Browning via devel : > Are there any C to golang or rust transpilers that work > reasonably well? The last time I checked the best rust > transpiler generated rs files that were just shallow glosses > and the golang transpiler was somewhat inadequate and > verbose. This is still the state

Re: Objectives for the next year

2021-06-18 Thread Eric S. Raymond via devel
Hal Murray : > What was the name for your attempt to get a GPSD style replay of old data? > Did we ever figure out why that didn't work? I did. There's a blog post about it: https://blog.ntpsec.org/2017/02/22/testframe-the-epic-failure.html -- http://www.catb.org/~esr/;>Eric

Re: Objectives for the next year

2021-06-18 Thread Eric S. Raymond via devel
Hal Murray : > > I'll start the ball rolling with this big one: It's time to move out of C. > > I want to threadify things, and taking advantage of that, I want to run at > full wire speed on a gigabit link with a modest server class CPU. > > I have test code running. I'm pretty sure it will

Objectives for the next year

2021-06-18 Thread Eric S. Raymond via devel
Developers, please weigh in on what you think the NTPSec project's goals for the next year ought to be. These goals can be coding projects ("Move the Python code to Go") process goals ("Halve the size of the issue list") or project infrastructure goals ("Build a hardware lab so we can live-test

Re: visiting the todo list

2021-06-08 Thread Eric S. Raymond via devel
Hal Murray via devel : > I'm still planning to threadify the server side. I'm stalled half on other > things and half waiting for Eric to get free so we can cleanup the ntpq stuff. Still on my to-do list. I'm still focused on my conversioon job, though, making me actual money. --

Re: What is the purpose of devel/ifdex-ignores?

2021-03-07 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > No, just boring history. I think those are old conditinal macros we no > > longer use; likely they have been renamed to something else. > > The current code tests for SO_TIMESTAMPNS > > Should I just delete the old/unused stuff? Yes. --

Re: What is the purpose of devel/ifdex-ignores?

2021-03-06 Thread Eric S. Raymond via devel
Hal Murray via devel : > >From ./devel/ifdex-ignores > USE_SCM_BINTIME # to grab timestamp for recv packet > USE_SCM_TIMESTAMP # " > USE_SCM_TIMESTAMPNS # " > > None of those symbols are used by our code. > > Should I just delete them? > > What is the idea for USE_xxx? Is

Re: What I have been doing 2021 post-January

2021-02-04 Thread Eric S. Raymond via devel
James Browning via devel : > I submitted a couple of patches to gpsd and one to microjson resolving > issues. One where an empty string validated correctly as an object was > already posted to microjson. The other allowed pretty much any string the > same length or shorter to pass a t_check. > >

Re: discrete units

2021-01-20 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Gary said: > > I think he is referring to reecent proposals to split ntpd up into multiple > > daemons. Daemons for the core, NTS, clients, etc. Each doing a small job. > > Rather than the one big daemon we have now. > > That sort of split looks good on paper, but

Re: GitLab | Projects forced to "Private" (#294196)

2020-12-17 Thread Eric S. Raymond via devel
James Browning via devel : > The ntpsec forks belonging to rlaager, selsky, and ianbreune are still > detached. A quick check shows that there are no forks. The page I looked at > claimed that such detached repositories cannot be reattached. TLDR there is > only on MR that still might be

Re: GitLab | Projects forced to "Private" (#294196)

2020-12-17 Thread Eric S. Raymond via devel
Sanjeev Gupta : > As of 20 minutes ago, I can now pull from the repository unauthenticated. Yes, and the visibility is now :Public" in the settings. Looks like the problem is solved. -- http://www.catb.org/~esr/;>Eric S. Raymond ___

Re: Blizard of mail from GitLab-Abuse-Automation

2020-12-16 Thread Eric S. Raymond via devel
Sanjeev Gupta via devel : > Ah, so not my fault. > > I tried updating my fork about 11 hours ago, and was to authenticate to > pull from the NTPsec git repo. I tried with another repo, it worked, so I > assumed one of us was modifying the security settings of the repo. Somwething either very

Re: Unity warnings

2020-09-06 Thread Eric S. Raymond via devel
Hal Murray : > Please do and/or please fix our local copy. I'm focused on the > restrict/unrestrict tangle. Bug fixed, but I cant finf any way to subnutt uissues on ther bugracker. Yes, I have a validayed account ob the site. Sill looking. -- http://www.catb.org/~esr/;>Eric S.

Re: Unity warnings

2020-09-06 Thread Eric S. Raymond via devel
Hal Murray via devel : > > I assume a fix for this should be pushed upstream. > > ../../tests/unity/unity.c: In function ‘UnityFail’: > ../../tests/unity/unity.c:1757:6: warning: function might be candidate for > attribute ‘noreturn’ [-Wsuggest-attribute=noreturn] > 1757 | void

Re: NEWS for release

2020-09-04 Thread Eric S. Raymond via devel
Hal Murray : > > > Looking at the changelog, the only one that jumps out at me is James's new > > UI > > options for ntpq. > > Should we have a policy of mentioning all UI changes? I think so. I've been trying to do that whenever I write NEWS entries. > How about config file changes? Well,

Re: I'm giving up on seccomp

2020-09-04 Thread Eric S. Raymond via devel
Hal Murray : > Is this an opportunity to clean up that area? I don't think so. It's pretty clean now, functionally speaking - I put a lot of work into rationalizing the configurator structures and the way they talk to the protocol machine. I suppose it might be if we were willing to make

Re: I'm giving up on seccomp

2020-09-04 Thread Eric S. Raymond via devel
Hal Murray : > > >> If you want to claim your Go program has no buffer overruns, > >> you can't call out to big complicated libraries written in c. You > >> would have to rewrite them in Go. > > > Fair point. That changes my to-do list. > > Could you please say more? What did you add or

Re: NEWS for release

2020-09-04 Thread Eric S. Raymond via devel
Hal Murray via devel : > Are any of the recent changes interesting enough to mention in NEWS? Looking at the changelog, the only one that jumps out at me is James's new UI options for ntpq. Otherwise the recent stuff is bug triage and validator cleanups (LGTM looks like a big win). I wouldn't

Re: Python support policy

2020-09-04 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > As previously mentioned here: RHEL 6. Which is about to EOL. > Supporting Python 2 is trivial. Why the hate? Because it's not in fact trivial. It's *doable*; Peter Donis and I are the expers on how to do it. But it's not trivial. It proliferates code and test

Re: Python support policy

2020-09-03 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Yo Eric! > > On Thu, 3 Sep 2020 14:13:05 -0400 > "Eric S. Raymond" wrote: > > > Gary E. Miller via devel : > > > Say what? This has zero to do with libraries. > > > > Sure it dies. Use different versions of Python, require different > > library paths. > > No

Re: Python support policy

2020-09-03 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Say what? This has zero to do with libraries. Sure it dies. Use different versions of Python, require different library paths. -- http://www.catb.org/~esr/;>Eric S. Raymond signature.asc Description: PGP signature

Re: Python support policy

2020-09-03 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > > I don't want to go down this road. I have ugly memories associated > > with a smiliar hack in gpsd, long ago. > > But what about how it works now? All the maintainers like it. Oh dear Goddess. We are *still* mutating shebangs in GPSD? I must have blotted that

Re: Python support policy

2020-09-03 Thread Eric S. Raymond via devel
Richard Laager via devel : > > You realize that the POSIX doc says a pace after "#!", but so many do it > > wrong they accept that variant. > In NTPsec, there are 122 the wrong way and 81 the right way. As you say, > either works. I don't particularly care about the space personally, but > we can

Re: Python support policy

2020-09-03 Thread Eric S. Raymond via devel
Richard Laager via devel : > RHEL 6 support (measured in terms of security updates) ends in November > of this year. So by the time a version of NTPsec releases without Python > 2 support, we'd be looking at RHEL 7. On top of that, it has been Red Hat's official position for some time that RHEL 6

Re: Pre-release cleanup

2020-09-03 Thread Eric S. Raymond via devel
Matthew Selsky : > I also previously setup Codacy in order to see what other SAST systems could > do. See https://app.codacy.com/gl/NTPsec/ntpsec/dashboard > > Let me know what you think. If either are useful, I'll integrate them more > tightly in our workflows. I'm already a fan of LGTM - it

Re: I'm giving up on seccomp

2020-09-03 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > >> I think you have jumped to an unreasonable conclusion by assuming that Go > >> makes seccomp unintestering. Are you going to rewrite OpenSSL in Go? > > No. There's an opennsl binding: ... > > That's the whole point of my comment. OpenSSL is

Re: Python support policy

2020-09-02 Thread Eric S. Raymond via devel
Richard Laager via devel : > Let me start over now that I've reviewed the specifics of the NTPsec > scripts and build system again: > > We are currently using "#!/usr/bin/env python" in all the scripts, and > waf uses the same. The minimum to do to drop Python 2 is: > > 1. Change waf's shebang:

Re: I'm giving up on seccomp

2020-09-02 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Buffer overruns are just one way a program might make unexpected system > calls. Even if you can guarantee that a Go program could never be > maliciously corrupted externally, you can never guarantee that the > Go program can not be trojaned. Everything is cost

Re: I'm giving up on seccomp

2020-09-02 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > I think you misunderstand. I don't believe seccomp is objectively very > > important in itself, and never have. My problem with dropping it is that if > > we do that, we could be seen to have abandoned part of a security defense in > > depth because

Re: I'm giving up on seccomp

2020-09-02 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Lost me. seccomp applies to Go as much as it applies to C. Why do you think so? My understanding is that the reason you want to block unexpected system calls is becase C buffer overruns can be used to make weird machines. You can't do that in Go, because there's no

Re: Pre-release cleanup

2020-09-02 Thread Eric S. Raymond via devel
Sanjeev Gupta : > They support *any* git repository. Huh. Their docs are out of date, then. > Please see: https://lgtm.com/projects/g/ntpsec/ntpsec/?mode=list That's excellent. I'll chew through some of these today. -- http://www.catb.org/~esr/;>Eric S. Raymond

Re: Pre-release cleanup

2020-09-02 Thread Eric S. Raymond via devel
folkert : > > > > I've resolved all the Coverity warbings except a new one, "risky > > > > function" related to random(3)/ The supression cookie for that one > > > > is not suppressing; I've sent a requesr to Synopsis about tis. > > > > > > Is ntpsec also checked by 'lgtm.com'? They also do all

Re: Pre-release cleanup

2020-09-02 Thread Eric S. Raymond via devel
folkert : > > I've resolved all the Coverity warbings except a new one, "risky > > function" related to random(3)/ The supression cookie for that one > > is not suppressing; I've sent a requesr to Synopsis about tis. > > Is ntpsec also checked by 'lgtm.com'? They also do all kinds of >

Python support policy

2020-09-02 Thread Eric S. Raymond via devel
Python 2 was end-of-lifed at the beginning of January this year. All our primary target platforms fully support Python 3. Retaining support for Python 2 proliferates test paths and complicates the fix for at least one outstanding bug. Philosophically, I'm a fan of dropping legacy support when it

Pre-release cleanup

2020-09-02 Thread Eric S. Raymond via devel
I've resolved all the Coverity warbings except a new one, "risky function" related to random(3)/ The supression cookie for that one is not suppressing; I've sent a requesr to Synopsis about tis. I've close two stale issues. I think there are a few more that can be retired. I'm continuing tio

Re: I'm giving up on seccomp

2020-09-02 Thread Eric S. Raymond via devel
Hal Murray : > You keep saying seccomp is important. What does it buy us? ntpd is a big > complicated program. It reads and writes files. It opens network > connections. What else would a bad guy need to do? I think you misunderstand. I don't believe seccomp is objectively very important

Re: How about a release soon?

2020-09-01 Thread Eric S. Raymond via devel
Hal Murray : > > I'll do a bug-triage pass. > > I've seen a couple of changes go by. Thanks. > > Please let me/us know when you are finished so I can test things. Will do. -- http://www.catb.org/~esr/;>Eric S. Raymond ___ devel

Re: How about a release soon?

2020-09-01 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Has there been enough user visible improvement to warrent a release of > > 1.1.10? > > I think so. > > 1.1.9 doesn't know about the new port number for NTS-KE. > > There is also a bug fix for a missing error message. Without that message, > it's really tough to

Re: Has anybody seen a system without STA_NANO?

2020-08-25 Thread Eric S. Raymond via devel
Daniel Franke : > clock_gettime is. Adjtimex isn't in any standard except for an obscure RFC > that nobody follows. > > On Tue, Aug 25, 2020, 20:47 Eric S. Raymond via devel > wrote: > > > Hal Murray via devel : > > > > > > When was clock_gettime and

Re: Has anybody seen a system without STA_NANO?

2020-08-25 Thread Eric S. Raymond via devel
Hal Murray via devel : > > When was clock_gettime and struct timespec introduced? > > We can cleanup some cruft if we assume it exists. Assune it. These are in the Single Unix Standard. -- http://www.catb.org/~esr/;>Eric S. Raymond

Re: Seccomp tangle

2020-05-27 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > Aaarrgghhh. It;s a huge pain in the ass and I wish it weren't interesting. > > But given our mission statememnnt, it has to be. > > Just to make sure we are on the same wavelength... > > My question/proposal was not to drop seccomp if we didn't do

Re: Seccomp tangle

2020-05-27 Thread Eric S. Raymond via devel
Hal Murray : > The first quirk is that ntpd isn't on the #include search path. > (My hack was to put a link from include to ntpd/seccomp) > What's the right way to handle this? (Maybe I just fatfingered things.) Generating the requred stuff into include, where all the headers live, ought to

Re: Seccomp tangle

2020-05-26 Thread Eric S. Raymond via devel
Hal Murray via devel : > > I've been experimenting with some code to allow custom scccomp lists. > > The idea is to replace the --enable-seccomp configure option with > --enable-seccomp=foo > and ntp_sandbox would include syscomp/foo.c which would be a list of syscalls > used by this system.

Re: BSD-4-Clause-UC license usage

2020-04-30 Thread Eric S. Raymond via devel
Matthew Selsky via devel : > Hi Hal and team, > > Much our of NTS code uses BSD-4-Clause-UC instead of BSD-2-Clause (our > preferred license for new code). > > What this license selection intentional? No. It's a historical accident. > Is BSD-4-Clause-UC intended for code owned by the

Re: The Epic of MRUlist.

2020-04-28 Thread Eric S. Raymond via devel
Ian Bruene via devel : > * What happens when a packet in the middle of the sequence is dropped? Who > knows! If it is seen as a timeout then the client will adjust packet size > and try again... forever. Or maybe it silently doesn't notice? > > * What happens when the final packet is dropped?

Re: NTS dropping TLS 1.2

2020-03-23 Thread Eric S. Raymond via devel
Hal Murray : > We can do several things: > 1) clean out the ifdefs that make things work with older versions of > OpenSSL. > That is drop support for systems that haven't upgraded their OpenSSL to a > supported version. > 2) leave things alone, ignore the RFC. > Or maybe add some

Re: droproot, seccomp

2020-02-25 Thread Eric S. Raymond via devel
Hal Murray : > I don't think it's worth the effort to maintain 2 lists. We can revisit that > if you think it's appropriate. No, I agree with you. > There are 46 syscalls in each list and 55 in the merged list. Brings up a question. Is the list of all syscalls used by everybody large relative

Re: droproot, seccomp

2020-02-25 Thread Eric S. Raymond via devel
James Browning via devel : > Is there anything preventing the possibility of an early looser > seccomp setup and then tightening it later possibly with a knob > to generate terse or verbose warnings instead of dying. That is a very interesting idea that I think deserves further examination. Do

Re: seccomp mess, continued, status update

2020-02-23 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Fedora fixed their problem. seccomp now builds and works on both Fedora and > Arch. > > But now it won't build on Alpine. It looks like the same problem that Fedora > had. The problem is a bug in a header file. Copying the ppoll bits from a > Fedora header file

Re: seccomp tangle

2020-02-23 Thread Eric S. Raymond via devel
Hal Murray via devel : > Should we drop secomp? It's a pain to maintain. We're a security-focused prodict. I don't think it would be good optics to drop a layer of defense just because it's a pain to maintain. > How many people use it? Richard: do you turn it on for the Debian builds? I have

Re: Is there a clean way for waf to test for the distro?

2020-02-22 Thread Eric S. Raymond via devel
Hal Murray via devel : > > Context is the seccomp tangle. Issue #633 > > Should I just add a helper that looks in /etc/os-release? lsb_release -a might be useful here. -- http://www.catb.org/~esr/;>Eric S. Raymond ___ devel

Re: New warning from NetBSD 9.0

2020-02-19 Thread Eric S. Raymond via devel
Hal Murray via devel : > > NetBSD just released version 9.0. It now generates this warning: > > ../../ntpd/ntp_control.c:1476:34: warning: '%s' directive output may be > truncated writing up to 255 bytes into a region of size between 0 and 255 > [-Wformat-truncation=] > > char

Re: Possible cruft cleanup: clock_gettime vs getitimer

2020-02-16 Thread Eric S. Raymond via devel
Hal Murray via devel : > devel/hacking.adoc says: > You *may* use clock_gettime(2) and clock_settime(2) calls, and > the related getitimer(2)/setitimer(2), from POSIX-1.2008. > > My man pages say both are in POSIX.1-2001. > > Is there any reason we don't pick one and discard the crufty

Re: Python, testing

2020-01-13 Thread Eric S. Raymond via devel
Hal Murray via devel : > A year or 2 ago, I put together a script to test as many build time options > as > I thought reasonable. It's in ./tests/option-tester.sh > > Does anybody other than me use it? I've run it once or twice, but's not easty to see how to integraste it into our regularr

Re: ublox refclock

2019-11-25 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > > So there is nothing you recommend be merged at this time? > > I sorta wish NTPsec had a staging area like the Linux kernel does. > > There is value to a small and clean u-blox driver fully integrated > into NTPsec. But without KPPS it is inferior at timekeeping. >

Re: Do we require clock_gettime()?

2019-11-25 Thread Eric S. Raymond via devel
Hal Murray : > > >From devel/hacking: > > Only POSIX-1.2001/SUSv3 library functions should be used (a few > specific exceptions are noted below). If a library > function not in that standard is required, then a wrapper function for > backward > compatibility must be provided. One notable case

Re: Clock fuzzing bugs

2019-11-25 Thread Eric S. Raymond via devel
Mark Atwood via devel : > On Sun, Nov 24, 2019, at 19:32, Hal Murray via devel wrote: > > > > e...@thyrsus.com said: > > > If we don't see any evidence of beat-induced quantization, I'm willing to > > > say > > > we drop this code. > > > > How about adding a --disable-fuzz configure option so

Re: Clock fuzzing bugs

2019-11-25 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Is there an existing patch to remove the fuzzing? There is not. See my reply to Mark. -- http://www.catb.org/~esr/;>Eric S. Raymond signature.asc Description: PGP signature ___ devel mailing list

Re: ublox refclock

2019-11-25 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > I just took a quick look at refclock_ubx.c > > An interesting start, but followup messsages today on the list are > assuming this driver does things that it does not do. > > 1) It does not, ever, config the u-blox. It does not, ever, write to > the u-blox to query

Re: ublox refclock

2019-11-24 Thread Eric S. Raymond via devel
Udo van den Heuvel : > On 24-11-2019 15:01, Eric S. Raymond wrote: > > Udo van den Heuvel : > >> I have an M8N on order, would that be compatible enough to this driver? > >> If so: I could help test etc. > > > > That can't hurt - they speak the same protocol - but the big deal with > > the T

Re: ublox refclock

2019-11-24 Thread Eric S. Raymond via devel
Udo van den Heuvel : > I have an M8N on order, would that be compatible enough to this driver? > If so: I could help test etc. That can't hurt - they speak the same protocol - but the big deal with the T variant os a stationary mode you don't have. --

Re: Clock fuzzing bugs

2019-11-24 Thread Eric S. Raymond via devel
Hal Murray via devel : > I'm tempted to rip out that stuff. I haven't quite convinced myself that it > isn't doing something important. Eric? The clock fuzzing? It's an interesting question. I've thought about it. I'm doubtful myself. The obvious motivation would be to avoid beat effects

Re: ublox refclock

2019-11-24 Thread Eric S. Raymond via devel
Udo van den Heuvel via devel : > I cam across this ublox ntpsec refclock: > https://gitlab.com/trv-n/ntpsec-ublox > Would it be usable for incorporation in the ntpsec tree? > (AFAIK this is a 'straight' refclock; no extra lines needed besides > rx/tx and pps) Thank you very much for bringing this

Re: ntpq mrulist bug

2019-11-20 Thread Eric S. Raymond via devel
Hal Murray : > Part of the problem is that there is a lot of cruft in that area. For > example, grep for CERR_ > There is a clump of signals defined as part of a ControlSession, none are > ever > raised, a few are caught. Looks like somebody decided to rename things to > SERR and never got

Re: ntpq mrulist bug

2019-11-20 Thread Eric S. Raymond via devel
Hal Murray via devel : > I know what's going wrong, but I'm not enough of a python geek to see a clean > fix. > > The basic idea is that the client sends a request and the server sends back a > clump of packets. The client specifies the max clump size. What's happening > is that at least one

Re: Buggy documentation

2019-11-17 Thread Eric S. Raymond via devel
Hal Murray via devel : > We also need a QuickStart for setting up ntpd: download, build, install, > test... > > There is a quickstart for NTS. It needs a lead-in paragraph that says it > assumes you are already running ntpsec -- go to link-above if that's not > correct. File an issue about

  1   2   3   4   5   6   7   8   9   >