NTS keys as I understand them

Gary E. Miller gem at rellim.com
Fri Jan 11 03:27:51 UTC 2019


Yo Ian!

On Thu, 10 Jan 2019 21:20:53 -0600
Ian Bruene via devel <devel at ntpsec.org> wrote:

> Because of this it is impossible
> for the server or client to update the c2s/s2c pair by sending new
> ones in a cookie.

The cookie is just a blob to the client.

The client, NTS-KE and NTPD never update a cookie they just use new ones.

The client does not update his cookie(s), he just asks the NTS-KE for
new ones when the NTPD NAKs the one he has been using.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
	gem at rellim.com  Tel:+1 541 382 8588

	    Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190110/4809b419/attachment.bin>


More information about the devel mailing list