ntp.conf changes for NTS
Gary E. Miller
gem at rellim.com
Thu Jan 31 21:41:50 UTC 2019
Yo Achim!
On Thu, 31 Jan 2019 22:19:14 +0100
Achim Gratz via devel <devel at ntpsec.org> wrote:
> Gary E. Miller via devel writes:
> > The C2S and S2C already get reused millions of times, what's a few
> > more million?
>
> Both keys should only ever be used by a single client/server pair.
Yeah, but no way to enforce that. A black-, white-, or gray-hat could
easily reuse the same keys on thousands of servers at the same time.
You easily get up to millions of known plaintext/known ciphertext pairs,
the nonces become overwhelmed and the master key recovered.
> These are symmetric keys, so whoever knows them can encrypt and
> decrypt all messages that use them.
Yup.
> So sharing these keys among
> different servers would imply trust between them and hopefully we can
> agree that different pool servers are in no such relationship.
By definition there is no trust in the pool.
> > But, as you said, the TLS "has" to be renegotiated, so that state
> > is lost for the next request.
>
> No, re-keyed -- you specifically want to avoid the TLS renegotiation
> or even worse, reconnection. The session itself stays open.
OK, re-keyed, but I see nothing in the Proposed RFC to support this mode
of operation. Sure, TLS alone supports re-keying, but the NTPD client
has no way to request a 2nd, different, NTPD server and cookie.
> You
> could conceivably just open another connection inside the same
> session as far as TLS is concerned. I don't know which of the two
> options is more efficient.
Neither, until the Proposed RFC supports it.
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190131/2ef2a250/attachment.bin>
More information about the devel
mailing list