On Mon, Aug 15, 2016 at 08:37:14AM -0400, Eric S. Raymond wrote:
> Hal Murray <hmur...@megapathdsl.net>:
> > 
> > e...@thyrsus.com said:
> > > While I accept this as a general principle, is there anything about the 
> > > new
> > > ntpleapfetch that inflicts a heavier load than the old ntpleapfetch has 
> > > been
> > > causing for decades with the tolerance of NIST and USNO? 
> > 
> > The old stuff has poor publicity.  None of the major distros/OSes come 
> > setup 
> > to run it from a cron job.  As long as you don't change that we won't have 
> > any problems.
> > 
> > The problem will happen if somebody improves our documentation enough so 
> > that 
> > somebody notices, and that seems reasonably likely.
> 
> I've thought about this some more, and now I am in doubt that the
> general principle (don't use other peoples' resources without their
> permission) applies here.  I think we need to apply what tort law
> would call a reasonable-person test.
> 
> Some kinds of public-facing offer of a resource clearly constitute an
> implied invitation to download it as needed.  Consider, for example, a web 
> page.
> 
> I think the NIST/IERS public offer of an authoritative leap-second resource
> constitutes the same sort of invitation.  If you disagree, ask yourself
> if your evaluation would change if that data were in HTML and accessed
> through port 80, or accessed by anonymous FTP. Surely the mechanics
> of how it's downloaded are irrelevant to the ethics of the situation!

That doesn't mean you should go and have millions of clients
change from not checking it to downloading it without at least
warning them about it.  It doesn't help anybody if we overload the
servers.


Kurt

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to