Skip to main content

Last Call Review of draft-ietf-ntp-chronos-16
review-ietf-ntp-chronos-16-tsvart-lc-pauly-2023-06-19-00

Request Review of draft-ietf-ntp-chronos
Requested revision No specific revision (document currently at 25)
Type Last Call Review
Team Transport Area Review Team (tsvart)
Deadline 2023-06-22
Requested 2023-06-08
Authors Neta Rozen Schiff , Danny Dolev , Tal Mizrahi , Michael Schapira
I-D last updated 2023-06-19
Completed reviews Dnsdir Last Call review of -14 by Geoff Huston (diff)
Genart Last Call review of -20 by Roni Even (diff)
Opsdir Last Call review of -16 by Tianran Zhou (diff)
Tsvart Last Call review of -16 by Tommy Pauly (diff)
Secdir Last Call review of -16 by Benjamin M. Schwartz (diff)
Intdir Telechat review of -17 by Tim Chown (diff)
Assignment Reviewer Tommy Pauly
State Completed
Request Last Call review on draft-ietf-ntp-chronos by Transport Area Review Team Assigned
Posted at https://mailarchive.ietf.org/arch/msg/tsv-art/lRbdj-U6wYJ33jND-lffQwF_Ow8
Reviewed revision 16 (document currently at 25)
Result Ready w/nits
Completed 2023-06-19
review-ietf-ntp-chronos-16-tsvart-lc-pauly-2023-06-19-00
This document has been reviewed as part of the transport area review team's
ongoing effort to review key IETF documents. These comments were written
primarily for the transport area directors, but are copied to the document's
authors and WG to allow them to address any issues raised and also to the IETF
discussion list for information.

When done at the time of IETF Last Call, the authors should consider this
review as part of the last-call comments they receive. Please always CC
tsv-art@ietf.org if you reply to or forward this review.

I have no concerns about this document from the transport perspective. Its use
of DNS queries and NTP transactions has a very low rate (intended to not
overwhelm servers), and doesn't raise any new concerns. This document also
doesn't add any new mechanisms that would affect usage of transport mechanisms,
ports, etc.

The document is clear and concise, although I have two nits for clarity:

- In Section 1, the term "Byzantine attackers" is used without reference or
explanation. Later, it does have a forward reference to the security section. I
suggest adding a forward reference or an external reference to explain the
attack, and potentially add a bit more context within the text to help readers
who are not familiar with that kind of attack. - A block diagram or other
illustration would be much appreciated in section 3 to help explain how the
Khronos function exists alongside current client software, and what servers it
is interacting with. I'm not sure how feasible such an image would be, but I
think it would make the document more easily understood.