First round of my stupid questions about NTS
Richard Laager
rlaager at wiktel.com
Fri Jan 18 23:40:51 UTC 2019
On 1/18/19 4:44 PM, Gary E. Miller via devel wrote:
> Maybe we want to derive C2S and S2C from the TLS session, but I do not
> see that as mandated.
Am I reading the right draft:
https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-15#section-5.1
If so, it is definitely mandated by "SHALL":
5.1. Key Extraction (for NTPv4)
Following a successful run of the NTS-KE protocol wherein Protocol ID
0 (NTPv4) is selected as a Next Protocol, two AEAD keys SHALL be
extracted: a client-to-server (C2S) key and a server-to-client (S2C)
key. These keys SHALL be computed according to RFC 5705 [RFC5705],
using the following inputs.
--
Richard
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190118/52762da1/attachment.bin>
More information about the devel
mailing list