[LEAPSECS] stale leap second information

Poul-Henning Kamp phk at phk.freebsd.dk
Wed Jan 14 14:53:52 EST 2015


--------
In message <20150114180119.qsYo2BoZ%sdaoden at yandex.com>, Steffen Nurpmeso write
s:

> |NTP is a much more specialized protocol than DNS and it is blocked
> |a lot of places.
>
>So i apologize, such a thing would indeed even be a great idea,
>fetchable via a simple getaddrinfo(3) / dig(1) call and
>automatically replicated from the DNS root servers down to the
>last zone!

Bingo.

Plenty of space for the data we need in an IPv4 'A' record, and
a human readable TXT record could supplement that.

>(Of course DNSSEC is horrible, in my humble opinion.  And your
>scheme will have problems at and after the days which actually
>introduce leap seconds.  But just as is today for those computers
>which get their leap information only via the TZ database.)

There is no problem if the message is "Next leap second is #N at
YYYY-MM" and after that changes to "Next leapsecond is #{N+1} at
unknown future date".

I've seriously been contemplating offering such a service myself
in order to get reliable leap-second info in Ntimed...

>Iirc NTP will get storage overflow problems in the mid (20)30s,

Handling of that has been documented since at least NTPv3 a
couple of decades ago.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk at FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.


More information about the LEAPSECS mailing list