Crypto - what algorithms to use?
Mark Atwood
fallenpegasus at gmail.com
Thu Mar 31 23:47:05 UTC 2016
We should live with MD5/SHA1 in shared key protocol, for now, for reasons
of compatibility, but document that we know it's not the current best
practice.
Who maintains the leap-file?
..m
On Mon, Mar 28, 2016 at 11:16 PM Hal Murray <hmurray at megapathdsl.net> wrote:
> The current ntpd has a simple shared key setup to make sure the client is
> talking to the right server. The payload is not encrypted. This is
> authentication, not confidentiality.
>
> It uses MD5 or SHA1. Those are getting a bit old. We should probably
> update
> things.
>
> Is there a good list of what algorithms are currently thought to be secure?
> I think the code changes will be simple - libcrypto does all the work. I
> don't know my way around that area, but I think I've seen an API to get a
> list of the algorithms it supports.
>
> Should we drop support for insecure algorithms, or retain it for backwards
> compatibility?
>
> Odds and ends:
>
> ntpd gets the SHA1 code from libcrypto from the openssl-libs package (on
> Fedora)
> There is MD5 code in libntp/a_md5encrypt.c, so you can use MD5 without
> libcrypto.
>
> Looks like there is also MD5 and SHA1 code in libisc
> They both use libcrypto is it's available, otherwise they provides real
> code.
> I don't think the MD5 code is ever used. The SHA1 code is used to verify
> the
> leap-file.
>
>
>
>
>
>
> --
> These are my opinions. I hate spam.
>
>
>
> _______________________________________________
> devel mailing list
> devel at ntpsec.org
> http://lists.ntpsec.org/mailman/listinfo/devel
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.ntpsec.org/pipermail/devel/attachments/20160331/6ce1b217/attachment.html>
More information about the devel
mailing list