ntp.conf changes for NTS

James Browning jamesb.fe80 at gmail.com
Sat Feb 2 21:04:25 UTC 2019


On Sat, Feb 2, 2019, 12:46 PM Gary E. Miller via devel <devel at ntpsec.org
wrote:

> Yo Hal!
>
> On Sat, 02 Feb 2019 12:36:10 -0800
> Hal Murray via devel <devel at ntpsec.org> wrote:
>
> > But there is another pair of keys: C2S and S2C.  They are used to
> > authenticate and encrypt traffic between client and server.  There is
> > no explicit mechanism to roll them over - nor is there a need for one.
>
> Really?  So unlimmited numbers of packets with identical C2S, S2S
> and master key, differing only int ehnonce is not a problem?
>
> Pretty much every crypto algorithm I know of has a recommended
> maximum number of uses.  Allowing these two to be used unlimited times
> is violating absic crypto principles goint back to well before how
> Enigma, and other ciphers, were broken.
>
> > But if no packets are lost, C2S and S2C will be used forever.
>
> Yeah, bad.


What you almost need is a cookie extension to trigger a rekeying
periodically. You might want to look at the 2nd? Commit of mr 902 and then
point and laugh.

>
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190202/b12af024/attachment.html>


More information about the devel mailing list