NTPsec on OpenSwitch
Srivatsan, Srinivasan
srinivasan.srivatsan at hpe.com
Mon Jan 11 23:02:15 UTC 2016
Thanks Hal,
Hal/Amar,
Regarding the issue with ‘waf configure’. Is there a way to bypass the configure step ? And provide a default configuration to work with ?
Thanks
Srinivasan
On 1/5/16, 2:30 PM, "Hal Murray" <hmurray at megapathdsl.net> wrote:
>
>srinivasan.srivatsan at hpe.com said:
>> * I have enabled a control key but was unable to configure a server through
>> a single ntpq command because it keeps on asking for keyid and password for
>> configuration through ntpq. But it would be helpful to add a server with a
>> single ntpq command with all the options on it, including the keyid and
>> password. Have you used it this way ?
>
>I haven't tried that. I just edit the config file and restart ntpd. If that
>isn't convenient in your environment, it's probably simpler to debug things
>on a pair of PCs.
>
>Read the shared key stuff. The keyid is the slot number in the server's
>shared key file. The password is the corresponding password. Or something
>like that.
>
>> * I see that the password is set using 'crypto pw??? and its all plain text.
>> Is there a way to save the password differently or configure the password
>> during runtime ?
>
>I think that's a different password. It's for decoding the autokey stuff
>which hasn't been tested and isn't generally used.
>
>
>
>srinivasan.srivatsan at hpe.com said:
>> * Could you share the configuration and commands which you used for your
>> tests ?
>> * I have not tested authentication scenario, what is the server
>> configuration which you used for testing authentication.
>
>For the shared key stuff, use ntpkeygen -M to make a batch of keys. It will
>make 10 MD5 keys. If you have the openssl libraries (and headers) installed,
>it will also make 10 more SHA1 keys.
>
>Put the file on both server and client. You need something like this in your
>config file on both client and server:
> keys /etc/ntp/ntp.keys
> trustedkey (1 ... 20)
>
>The 20 assumes you have SSL. If not, use 10.
>
>Then on the client, you say something like:
> server 1.2.3.4 key 3
>
>The important idea is that the slot you pick (3 above) has to have the same
>line in the keys file on both machines - both systems use the same slot
>number as well as the same key.
>
>If you run tcpdump, the length of the packet changes depending on if you have
> none, MD5, or SHA1 keys.
>
>I don't know of any easy way to debug the authentication stuff. None of the
>log files nor ntpq tell you anything helpful. If it works, ntpq will show
>you the same stuff as it does without authentication.
>
>Actually, there are a few syslog messages and a few counters but I forget
>where they are.
>
>
>
>
>--
>These are my opinions. I hate spam.
>
>
>
More information about the devel
mailing list