NTS client configuration support has landed
Eric S. Raymond
esr at thyrsus.com
Fri Feb 1 15:19:53 UTC 2019
I have enhanced the configuration parser to process NTS client-side
configuration options. The configuration state is available to the
nts.c hooks as members of a structure passed to them, along with the
dynamic NTS state (stored cookies) and the parsed content of the
current packet.
What is implemented differs from what was in nts.adoc in one way...
Having a separate nts config statement would have required admins to
enter the name of a server to which secure connection is intended
twice, once in the server declaration and once in the nts declaration.
This was suboptimal design, inviting subtle configuration bugs due to
typos.
Accordingly, the nts configuration stuff is implemented in a way that
conforms to good DRY (Don't Repeat Yourself) architectural practice.
That is, as options to the "server" declaration.
I have updated the documentation pages to describe the NTS options as
implemented (under Association Options). There is also a new
placeholder section on the Authentication page for NTS; more
documentation can go there.
I have generally reorganized that page to make it clearer that there
are multiple authenticattion modes; the MAC-based one is now called
"MAC Authentication" to contrast it with NTS and MS-SNTP. I have added
a note about MD-5 and SHA-1 being rather broken at this point, and a
warning that MAC authentication may be removed in a future release.
Of course that cannot happen until NTS is fully deployed, but I want
to accustom users to the idea that mechanisms past their sell-by
date will be ripped out.
--
>>esr>>
More information about the devel
mailing list