Re: Should two-digit years be fatal to a refclock?

2019-02-05 Thread Hal Murray via devel
You can also try fudging it by 1024*7*24*60*60 -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel

Re: Should two-digit years be fatal to a refclock?

2019-02-05 Thread Richard Laager via devel
On 2/4/19 3:58 PM, Hal Murray via devel wrote: > What's wrong with just adding 2000 to 2 digit years? We are in the 2000s now > so we don't have to consider the 1900 case any more. I'd be happy to > reconsider dropping support for 2-digit drivers in another 30 years. > > There is another

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > Don't you think it makes sense to very our client code against a known-good > > implementation first, though? > > Maybe. Maybe not. > > If we had a known-good server and somebody who was sitting next to me knew > all > about it and was prepared to

Re: NTS next steps

2019-02-05 Thread James Browning via devel
On 2/5/19, Eric S. Raymond via devel wrote: > Hal Murray : >> >> > 2. Put together client-side NTS support. This mainly means filling in >> >ntpd/nts.c, as I have already written required the hooks into the >> >protocol machine. >> >> We need code to generate cookies. And test code to

Re: NTS next steps

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > > > 2. Put together client-side NTS support. This mainly means filling in > >ntpd/nts.c, as I have already written required the hooks into the > >protocol machine. > > We need code to generate cookies. And test code to pack, encrypt, decrypt, > and unpack. (No byte

Re: NTS next steps

2019-02-05 Thread Hal Murray via devel
> 2. Put together client-side NTS support. This mainly means filling in >ntpd/nts.c, as I have already written required the hooks into the >protocol machine. We need code to generate cookies. And test code to pack, encrypt, decrypt, and unpack. (No byte swapping - we get back what

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
e...@thyrsus.com said: > Don't you think it makes sense to very our client code against a known-good > implementation first, though? Maybe. Maybe not. If we had a known-good server and somebody who was sitting next to me knew all about it and was prepared to help debug, sure that would be a

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > I think we'd best completely avoid writing an NTS-KE server until we have > > tested our client side against one of the two existing server > > implementations. > > Then we have to learn how to drive the existing implementations, and learn > enough

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
e...@thyrsus.com said: > I think we'd best completely avoid writing an NTS-KE server until we have > tested our client side against one of the two existing server > implementations. Then we have to learn how to drive the existing implementations, and learn enough about how they operate so we

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > > In fact, it's not strictly speeking something we need to fix until we're > > worrieed about using a C library other than glibc. It does some weird things > > under the hood to make stdio operations thread-safe. > > msyslog is mostly not stdio so that won't help much. I see the

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
> Please open an issue. It's not something I can give priority to at the > moment. Done. > In fact, it's not strictly speeking something we need to fix until we're > worrieed about using a C library other than glibc. It does some weird things > under the hood to make stdio operations

NTS next steps

2019-02-05 Thread Eric S. Raymond via devel
We have a number of tasks ahead of us, and I'm hoping for volunteers to step up. I can't do all the code myself; I expect to have plenty on my plate documenting things, being everybody's utility coder for the interfaces between NTS and the rest of NTPsec, and reviewing code. The tasks: 1.

Re: Docs we will need

2019-02-05 Thread Richard Laager via devel
On 2/4/19 3:40 PM, Hal Murray via devel wrote: > At shutdown probably isn't good enough. You don't get clean shutdowns on a > site wide power loss. Maybe shutdown and a weekly/monthly cron job. Sure, that's a fair point. I'm not sure what the default behavior is on Raspberry Pi systems. > Are

Re: Docs we will need

2019-02-05 Thread Richard Laager via devel
On 2/4/19 12:07 PM, Hal Murray via devel wrote: > Another complication with getting started after a building/site wide power > loss is that getting time needs DNS and the local caching DNS server may be > waiting for valid time. The resolver really shouldn't be waiting for network time, as

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > > Eric: > > I plan to post a detailed analysis and task list later today. I'm working > > on > > that now. > > I have hack code that makes a TLS connection and verifies certificates. > > If/when things calm down, I'll start folding it in. If that was going to go into nts.c

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > Please make sure this gets on your list. Do you have a list for NTS or > should > I make an issue for it? Please open an issue. It's not something I can give priority to at the moment. In fact, it's not strictly speeking something we need to fix until we're worrieed about

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
Thanks. Please make sure this gets on your list. Do you have a list for NTS or should I make an issue for it? I haven't looked at the code recently. This seems like a good opportunity for a review and cleanup and/or the addition of a good comment discussing the thread area. I think the

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
Eric: > I plan to post a detailed analysis and task list later today. I'm working on > that now. I have hack code that makes a TLS connection and verifies certificates. If/when things calm down, I'll start folding it in. ntpd/ntpd.c has a main() in it. Is the plan to have NTS-KE-server

Re: Going forward with NTS

2019-02-05 Thread Achim Gratz via devel
Hal Murray via devel writes: > One thing that would be very nice is for msyslog to be thread safe. > > If we use a lock, we need to be able to recover in case we crash within > msyslog while the lock is held. > > I'm not enough of a Unix file system wizard. Are there any guarantees about >

Re: Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
Hal Murray : > I'm not enough of a Unix file system wizard. Are there any guarantees about > multi-threaded writes to the same file not getting scrambled? Will it work > if > we buffer everything into a big buffer and do a single write? Under Linux, yes, up to 4096 bytes. Look for "I wrote a

Re: Going forward with NTS

2019-02-05 Thread Hal Murray via devel
> I plan to post a detailed analysis and task list later today. I'm working on > that now. One thing that would be very nice is for msyslog to be thread safe. If we use a lock, we need to be able to recover in case we crash within msyslog while the lock is held. I'm not enough of a Unix

Re: Amusing implications

2019-02-05 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Matthew Selsky via devel writes: > > See https://www.ntpsec.org/drivers.html > > > > INACCURATE > > Remove GPS drivers and time radios for which the hardware offers no > > better source accuracy than a timing GPS available for less than $75 > > in 2015; that is, about

Re: DEC Alpha

2019-02-05 Thread Gary E. Miller via devel
Yo Achim! On Tue, 05 Feb 2019 19:56:07 +0100 Achim Gratz via devel wrote: > Eric S. Raymond via devel writes: > > Achim Gratz via devel : > >> I visited DEC in Palo Alto one time and got to see the very first > >> Alpha mainboard (with an alcohol heatpipe made from a glass tube > >> atop the

Re: Amusing implications

2019-02-05 Thread Achim Gratz via devel
Matthew Selsky via devel writes: > See https://www.ntpsec.org/drivers.html > > INACCURATE > Remove GPS drivers and time radios for which the hardware offers no > better source accuracy than a timing GPS available for less than $75 > in 2015; that is, about 5µs. (However, do not necessarily remove

Re: DEC Alpha

2019-02-05 Thread Achim Gratz via devel
Eric S. Raymond via devel writes: > Achim Gratz via devel : >> I visited DEC in Palo Alto one time and got to see the very first Alpha >> mainboard (with an alcohol heatpipe made from a glass tube atop the >> CPU). > > Damn shame about the Alpha. That was a good design that DEC utterly botched >

Re: Should two-digit years be fatal to a refclock?

2019-02-05 Thread Achim Gratz via devel
Eric S. Raymond via devel writes: > Achim Gratz via devel : >> You can have all these errors with four digit years. > > Of course we can. I'm not claiming that disqualifying these sources > with 2-digit year reports will solve the problem, just reduce the > number of failure modes and the

Going forward with NTS

2019-02-05 Thread Eric S. Raymond via devel
I've been quiet about the NTS work for the last couple of days because, off-list, I was trying to recruit the person who cooperated with Daniel on the draft RFC and write the first server implementation to do our client-side code. Had I succeeded, that would have changed our planning a lot. Alas,