NTPsec on OpenSwitch

Mark Atwood fallenpegasus at gmail.com
Wed Dec 23 23:12:16 UTC 2015


Hello Srinivasan and Rahul,

I the PM for the NTPsec project, and I'm also a fellow HPE employee. I've
been working with you guys on your open source governance setup.   You can
contact me about any currently non-public work about OpenSwitch at <
mark.atwood at hpe.com>.

We have not yet integrated NTPsec with Yocto, but would be willing to do so.

The NTPsec configuration files and control methods are presently
substantially similar to those of the NTF NTP Classic implementation.

As to your other technical questions, I refer you to our tech lead, Eric
Raymond.

We are extremely willing to work with the OpenSwitch project to make this
integration work.

..m



On Wed, Dec 23, 2015 at 1:16 PM Srivatsan, Srinivasan <
srinivasan.srivatsan at hpe.com> wrote:

> Hi NTPsec team,
>
> I am Srinivasan and working with the OpenSwitch team at HPE. We are
> planning to use NTPsec as part of OpenSwitch. For the initial release we
> are planning to support only NTP client. I have some questions based off
> that.
>
>   *   Would you know if someone has integrated NTPsec into the yocto
> project with a bitbake recipe (.bb file). If its there then I could use
> that as reference for my integration with OpenSwitch because it uses
> Yocto/Bitbake framework.
>   *   Based on what we want to support in the initial release, the
> interaction with the daemon would include the following: For each of these
> scenarios, what is the best way to print/configure the info? Can I make a
> socket/api call to get this info OR is it through a command OR is it
> through a .conf file change and restarting the daemon?
>      *   Daemon is up and we need to print the current ntp status info,
>      *   Daemon is up and we need to print the NTP associations info,
>      *   Daemon is up, but we need to allow runtime configuration for
> different NTP servers, along with “prefer” and “version” setting for that
> NTP server. Can we update the Daemon to pick up this new configuration or
> do we have to write to the .conf file and then restart the daemon ?
>      *   Daemon is up, the user would provide the key-number and md5
> clientpassword. We want to use this configuration for the specific server
> instead of using autokey. Can a restart of the Daemon be avoided when
> setting authentication with the ntp client.
>   *   Based on the online material in your website, I have a few questions
> about the NTPsec support
>      *   Does the Daemon support configuring of Broadcast, Multicast or
> Manycasting clients.
>      *   Does the Daemon support Ipv6 Configuration ? If so does Daemon
> support mixed Ipv4 and Ipv6 NTP server configuration ?
>
> Thanks for supporting NTPsec, looking forward for your response.
>
> Regards
> Srinivasan
>
>
>
> _______________________________________________
> devel mailing list
> devel at ntpsec.org
> http://lists.ntpsec.org/mailman/listinfo/devel
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ntpsec.org/pipermail/devel/attachments/20151223/eead7e64/attachment.html>


More information about the devel mailing list