The state of NTPsec as I see it

Hal Murray hmurray at megapathdsl.net
Mon Jan 23 00:47:59 UTC 2017


esr at thyrsus.com said:
>> I think the ntpq retransmission logic is still broken.
> Urgh.  Do you know any way to reproduce this? 

I've had the reverse problem.  It always strikes when I'm trying to get real 
work done.

My test case is just the typical network dropping packets.  Try mrulist on a 
remote system with a big list.

I haven't looked at ntpq recently.  If there is a single place where it reads 
packets, you can hack that to randomly drop packets.  That will let you test 
things on a local LAN where the network doesn't drop packets.

Or get some flaky WiFi gear.  Maybe move far enough away.  Small USB WiFi 
chips are not expensive.  You can add one to a Raspberry Pi.

Plan B would be to hack the server side.  I think the mode 6 responses all go 
through a single place.

The restrict stuff has a +flake+ option.  It's in docs/includes/access-command
s.txt
That will drop request packets arriving at the server.  (I think, not tested)
That might be enough.  Or maybe we need the case where ntpq gets a partial 
answer.
  +flake+;;
    Discard received NTP packets with probability 0.1; that is, on
    average drop one packet in ten. This is for testing and amusement.
    The name comes from Bob Braden's _flakeway_, which once did a
    similar thing for early Internet testing.

--------

https://tools.ietf.org/html/rfc1025
    Some test are made more interesting by the use of a "flakeway".  A
   flakeway is a purposely flakey gateway.  It should have control
   parameters that can be adjusted while it is running to specify a
   percentage of datagrams to be dropped, a percentage of datagrams to
   be corrupted and passed on, and a percentage of datagrams to be
   reordered so that they arrive in a different order than sent.

-- 
These are my opinions.  I hate spam.





More information about the devel mailing list