On 10/13/2011 2:28 PM, Kevin Gross wrote:
> Definitely important issues for some synchronization protocols but it
> seems though two-step 1588 would work through such a connection. The
> followup message will contain an accurate (and encrypted) timestamp.
> Encryption delays would not result in significant loss of accuracy with
> respect to an unencrypted connection also using two step.
> 

Has anyone tested or measured that? I have not seen any information how
this will work without losing accuracy. Don't forget the followon
message will also have to be encrypted and decrypted when sent making
for additional uncertainties and errors. I have not reviewed how the
two-step IEEE 1588 protocol works so I don't have a good understanding
of the effects of IPsec encryption on such packets.

Danny
> Kevin Gross
> 
> On Thu, Oct 13, 2011 at 8:43 AM, Danny Mayer <ma...@ntp.org
> <mailto:ma...@ntp.org>> wrote:
> 
>     On 9/18/2011 9:41 PM, Cui Yang wrote:
> 
> 
>     IEEE-1588 (PTP) also cannot benefit from this as it is basically a
>     hardware-stamping protocol and now you are routing it through a software
>     tunnel which means it has to be timestamped before it is IPsec
>     encapsulated which decreases it's accuracy. It's no longer on-wire.
> 
> 

_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to