Re: prep for point release of NTPSec, suggest 2019-07-31

2019-08-25 Thread Sanjeev Gupta via devel
On Sun, Aug 25, 2019 at 1:49 PM Achim Gratz via devel wrote: > Mark Atwood via devel writes: > > How does everyone feel about next Saturday, Aug 31 2019-07-31? > > You've got a time machine? 8-) > No, but as Chronos is not implemented, he can set time to what ever he wants on the NIST and

Re: prep for point release of NTPSec, suggest 2019-07-31

2019-08-24 Thread Achim Gratz via devel
Mark Atwood via devel writes: > How does everyone feel about next Saturday, Aug 31 2019-07-31? You've got a time machine? 8-) Regards, Achim. -- +<[Q+ Matrix-12 WAVE#46+305 Neuron microQkb Andromeda XTk Blofeld]>+ Wavetables for the Terratec KOMPLEXER:

Re: prep for point release of NTPSec, suggest 2019-07-31

2019-08-24 Thread Hal Murray via devel
> How does everyone feel about next Saturday, Aug 31 2019-07-31? Looks good to me. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel

prep for point release of NTPSec, suggest 2019-07-31

2019-08-24 Thread Mark Atwood via devel
There is discussion of a need for a point release of NTPsec. I agree, we've done a bunch of useful and user visible stuff. How does everyone feel about next Saturday, Aug 31 2019-07-31? That gives us a week to beat on our new features, and to merge and beat on pending merge requests. ..m

Re: Point release of NTPSec

2019-08-24 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > > But doing the right thing is better than a switch. And the test is a cost > > that only needs to be paid once. > > I think your no-switch approach is good for things where the choice is A or > B, > like picking the right baud rate. > > But this

Re: Point release of NTPSec

2019-08-24 Thread Achim Gratz via devel
Hal Murray via devel writes: >> Basically, I wish to highlight that things may *break* with pre 1.2.0 > > Do we have any hints that anybody else who interoperated with our old code > depended on our bug? Pretty much everybody seems to have had the same bug: accepting whatever the server sent

Re: Point release of NTPSec

2019-08-24 Thread Hal Murray via devel
I just changed the NTS key rotation timer from 1 hour to 1 day. The spec is setup for 1 day. 1 hour enables testing. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel

Re: Point release of NTPSec

2019-08-24 Thread Hal Murray via devel
e...@thyrsus.com said: > But doing the right thing is better than a switch. And the test is a cost > that only needs to be paid once. I think your no-switch approach is good for things where the choice is A or B, like picking the right baud rate. But this isn't one of those cases. This is

Re: Point release of NTPSec

2019-08-23 Thread Hal Murray via devel
> Would this be a better formulation? The NTS ALPN negotiation sequence now > checks for length of the handshake string. This may break interoperability > with other, non-compliant, NTS implementations. > Basically, I wish to highlight that things may *break* with pre 1.2.0 Do we have any

Re: Point release of NTPSec

2019-08-23 Thread Eric S. Raymond via devel
Richard Laager via devel : > On 8/23/19 6:55 PM, Hal Murray via devel wrote: > > Or maybe wait for the NTS RFC to come out so we have a good reason for the > > release. > > What is the official (or barring that, consensus) view on the quality of > NTS in NTPsec? Is it something that is usable in

Re: Point release of NTPSec

2019-08-23 Thread Eric S. Raymond via devel
Hal Murray : > > >> Is there time to add an IPv4 only initialization option for NTS? > > Options are bad, in general. Explain why you want this> > > (I was going to poke you on this.) > > There is a bug waiting for your comment - #666. Looks like you found it. > > > I hate options. They add

Re: Point release of NTPSec

2019-08-23 Thread Eric S. Raymond via devel
Sanjeev Gupta : > Eric > > NEWS: > The NTS ALPN negotiation sequence has been modified for improved > interoperability with orther NTS implementations. > > Would this be a better formulation? > The NTS ALPN negotiation sequence now checks for length of the handshake > string. > This may break

Re: Point release of NTPSec

2019-08-23 Thread Hal Murray via devel
devel@ntpsec.org said: >> Or maybe wait for the NTS RFC to come out so we have a good >> reason for the release. > What is the official (or barring that, consensus) view on the quality of NTS > in NTPsec? Is it something that is usable in production? If so, please cut a > release sooner rather

Re: Point release of NTPSec

2019-08-23 Thread Sanjeev Gupta via devel
Eric NEWS: The NTS ALPN negotiation sequence has been modified for improved interoperability with orther NTS implementations. Would this be a better formulation? The NTS ALPN negotiation sequence now checks for length of the handshake string. This may break interoperability with other,

Re: Point release of NTPSec

2019-08-23 Thread Richard Laager via devel
On 8/23/19 6:55 PM, Hal Murray via devel wrote: > Or maybe wait for the NTS RFC to come out so we have a good reason for the > release. What is the official (or barring that, consensus) view on the quality of NTS in NTPsec? Is it something that is usable in production? If so, please cut a

Re: Point release of NTPSec

2019-08-23 Thread Hal Murray via devel
> Does it make sense to call this 1.2.0 instead of 1.1.7? Especially since we > have the ALPN compatiblity fix? I suggest 1.1.7 soon, then a round of testing and cleanup before 1.2.0. Or maybe wait for the NTS RFC to come out so we have a good reason for the release. -- These are my

Re: Point release of NTPSec

2019-08-23 Thread Hal Murray via devel
>> Is there time to add an IPv4 only initialization option for NTS? > Options are bad, in general. Explain why you want this> (I was going to poke you on this.) There is a bug waiting for your comment - #666. Looks like you found it. > I hate options. They add complexity and proliferate

Re: Point release of NTPSec

2019-08-23 Thread James Browning via devel
On Fri, Aug 23, 2019 at 12:41 PM Eric S. Raymond wrote: > James Browning via devel : > > AFAICT issues 599 and 566 still affect FreeBSD. > > Not urgent, IMO. In particular, I'm now fweeking more pressure to get > the NTS fix out. > Then they can wait. Sanjeev pointed out that there are lots of

Re: Point release of NTPSec

2019-08-23 Thread Sanjeev Gupta via devel
James, I am not sure on the time frame to patch and merge the issues you mentioned, but I am concerned about the change to the behaviour of NTS. We are not short of integers, 1.3.0 can be next week :-) On Sat, 24 Aug 2019, 3:27 AM James Browning via devel, wrote: > On Fri, Aug 23, 2019 at 9:43

Re: Point release of NTPSec

2019-08-23 Thread Eric S. Raymond via devel
James Browning via devel : > AFAICT issues 599 and 566 still affect FreeBSD. Not urgent, IMO. In particular, I'm now fweeking more pressure to get the NTS fix out. > There is a stub in devel/README mentioning devel/tidy which never made it > into the tree. Oops. Just fixed. > Is there time

Re: Point release of NTPSec

2019-08-23 Thread James Browning via devel
On Fri, Aug 23, 2019 at 9:43 AM Sanjeev Gupta via devel wrote: > We need a point release. Significant things that have happened recently: > > >- The g and G suffixes >- Removal of neoclock4x >- Some doc changes >- The ALPN change > > The last is critical, it throws into doubt all

Re: Point release of NTPSec

2019-08-23 Thread Sanjeev Gupta via devel
On Sat, Aug 24, 2019 at 2:36 AM Matthew Selsky wrote: > Does it make sense to call this 1.2.0 instead of 1.1.7? Especially since > we have the ALPN compatiblity fix? > Yes, please. Although NTS implementation internally has (only trivially) changed, a bump to 1.2.0 would provide more warning

Re: Point release of NTPSec

2019-08-23 Thread Matthew Selsky via devel
On Fri, Aug 23, 2019 at 02:12:21PM -0400, Eric S. Raymond via devel wrote: > Sanjeev Gupta : > > We need a point release. Significant things that have happened recently: > > > > > >- The g and G suffixes > >- Removal of neoclock4x > >- Some doc changes > >- The ALPN change > > >

Re: Point release of NTPSec

2019-08-23 Thread Eric S. Raymond via devel
Sanjeev Gupta : > We need a point release. Significant things that have happened recently: > > >- The g and G suffixes >- Removal of neoclock4x >- Some doc changes >- The ALPN change > > The last is critical, it throws into doubt all the interop we have with > other NTS

Re: Point release of NTPSec

2019-08-23 Thread James Browning via devel
On Fri, Aug 23, 2019, 9:43 AM Sanjeev Gupta via devel wrote: > We need a point release. Significant things that have happened recently: > > >- The g and G suffixes >- Removal of neoclock4x >- Some doc changes >- The ALPN change > > The last is critical, it throws into doubt all

Point release of NTPSec

2019-08-23 Thread Sanjeev Gupta via devel
We need a point release. Significant things that have happened recently: - The g and G suffixes - Removal of neoclock4x - Some doc changes - The ALPN change The last is critical, it throws into doubt all the interop we have with other NTS implementations. We need a tag to describe