NTS keys as I understand them

Hal Murray hmurray at megapathdsl.net
Tue Jan 15 09:45:58 UTC 2019


Gary said:
> I'm perfectly happy with that, just not to the exclusion of other ways to
> interpret the Proposed RFC. 

I don't understand that.  How many ways to interpret it are there?

Page 18 says:
  To protect the client's privacy, the client SHOULD avoid reusing a
  cookie. If the client does not have any cookies that it has not
  already sent, it SHOULD initiate a re-run the NTS-KE protocol. The
  client MAY reuse cookies in order to prioritize resilience over
  unlinkability. Which of the two that should be prioritized in any
  particular case is dependent on the application and the user's
  preference. Section 10.1 describes the privacy considerations of
  this in further detail.

I'm not a language lawyer, but that seems clear to me.  It doesn't say you can 
use a single cookie to simplify your code.  It says it's OK to reuse cookies 
if you have run out and you have decided that trying for a NTP exchange is 
more important than getting tracked.

This whole discussion is a waste of time.  If we had code that did everything 
else but reused a cookie it got from the NTS-KE step, I could fix it to use 
new cookies in an evening.  (Maybe weekend, I'm crappy about time estimates.)


-- 
These are my opinions.  I hate spam.





More information about the devel mailing list