NTS keys as I understand them
Gary E. Miller
gem at rellim.com
Fri Jan 11 03:27:51 UTC 2019
Yo Ian!
On Thu, 10 Jan 2019 21:20:53 -0600
Ian Bruene via devel <devel at ntpsec.org> wrote:
> Because of this it is impossible
> for the server or client to update the c2s/s2c pair by sending new
> ones in a cookie.
The cookie is just a blob to the client.
The client, NTS-KE and NTPD never update a cookie they just use new ones.
The client does not update his cookie(s), he just asks the NTS-KE for
new ones when the NTPD NAKs the one he has been using.
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190110/4809b419/attachment.bin>
More information about the devel
mailing list