NTPsec on OpenSwitch
Hal Murray
hmurray at megapathdsl.net
Tue Jan 5 22:30:37 UTC 2016
srinivasan.srivatsan at hpe.com said:
> * I have enabled a control key but was unable to configure a server through
> a single ntpq command because it keeps on asking for keyid and password for
> configuration through ntpq. But it would be helpful to add a server with a
> single ntpq command with all the options on it, including the keyid and
> password. Have you used it this way ?
I haven't tried that. I just edit the config file and restart ntpd. If that
isn't convenient in your environment, it's probably simpler to debug things
on a pair of PCs.
Read the shared key stuff. The keyid is the slot number in the server's
shared key file. The password is the corresponding password. Or something
like that.
> * I see that the password is set using 'crypto pwâ and its all plain text.
> Is there a way to save the password differently or configure the password
> during runtime ?
I think that's a different password. It's for decoding the autokey stuff
which hasn't been tested and isn't generally used.
srinivasan.srivatsan at hpe.com said:
> * Could you share the configuration and commands which you used for your
> tests ?
> * I have not tested authentication scenario, what is the server
> configuration which you used for testing authentication.
For the shared key stuff, use ntpkeygen -M to make a batch of keys. It will
make 10 MD5 keys. If you have the openssl libraries (and headers) installed,
it will also make 10 more SHA1 keys.
Put the file on both server and client. You need something like this in your
config file on both client and server:
keys /etc/ntp/ntp.keys
trustedkey (1 ... 20)
The 20 assumes you have SSL. If not, use 10.
Then on the client, you say something like:
server 1.2.3.4 key 3
The important idea is that the slot you pick (3 above) has to have the same
line in the keys file on both machines - both systems use the same slot
number as well as the same key.
If you run tcpdump, the length of the packet changes depending on if you have
none, MD5, or SHA1 keys.
I don't know of any easy way to debug the authentication stuff. None of the
log files nor ntpq tell you anything helpful. If it works, ntpq will show
you the same stuff as it does without authentication.
Actually, there are a few syslog messages and a few counters but I forget
where they are.
--
These are my opinions. I hate spam.
More information about the devel
mailing list