-4 and -6 should work with nts
Gary E. Miller
gem at rellim.com
Thu Mar 21 20:03:29 UTC 2019
Yo Hal!
On Thu, 21 Mar 2019 12:32:20 -0700
Hal Murray via devel <devel at ntpsec.org> wrote:
> > Hmm, I've got issues. Would be nice if ntpmon showed the IPv4/ipv6
> > status.
>
> That's not a NTS issue. (Yes, it would be nice if we could improve
> it, but not high on my list.)
True, but I need something to help me debug NTS.
> You might be able to get what you want if the reverse DNS has a 4/6
> in the name. I'm not a wizard in this area.
Which breaks Lets Encrypt. Not gonna do that.
> > I added this to kong.rellim.com:
> > server pi3.rellim.com nts -4 maxpoll 5
> > server pi3.rellim.com nts -6 maxpoll 5
>
> I think the -4 and -6 go between the "server" and host name. Please
> check the log files for an error message.
I just sent you my logs.
Putting the -4 or -6 before nts totally breaks nts.
Bummer this is order dependent...
New log, with the -4/-6 and nts swapped, attached.
> > TLS 1.2 only, TCP port 123. They will go up and down frequently.
>
> TLS 1.3 now available on ntp1.glypnod.com (San Francisco) and
> ntp2.glypnod.com (London).
Sort of. I added this to kong:
server ntp1.glypnod.com nts
No TLS 1.3:
2019-03-21T13:00:21 ntpd[26975]: DNS: dns_probe: ntp1.glypnod.com, cast_flags:1, flags
:21801
2019-03-21T13:00:22 ntpd[26975]: NTSc: DNS lookup of ntp1.glypnod.com took 0.846 sec
2019-03-21T13:00:22 ntpd[26975]: NTSc: nts_probe connecting to ntp1.glypnod.com:ntp => [2604:a880:1:20::17:5001]:123
2019-03-21T13:00:22 ntpd[26975]: NTSc: Using TLSv1.2, ECDHE-RSA-AES256-GCM-SHA384 (256)
2019-03-21T13:00:22 ntpd[26975]: NTSc: certificate subject name: /CN=ntp1.glypnod.com
2019-03-21T13:00:22 ntpd[26975]: NTSc: certificate issuer name: /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
2019-03-21T13:00:22 ntpd[26975]: NTSc: certificate is valid.
2019-03-21T13:00:22 ntpd[26975]: NTSc: read 880 bytes
2019-03-21T13:00:22 ntpd[26975]: NTSc: Got 8 cookies, length 104, aead=15.
2019-03-21T13:00:22 ntpd[26975]: NTSc: NTS-KE req to ntp1.glypnod.com took 1.009 sec, OK
2019-03-21T13:00:22 ntpd[26975]: DNS: dns_check: processing ntp1.glypnod.com, 1, 21801
2019-03-21T13:00:22 ntpd[26975]: DNS: Server taking: 2604:a880:1:20::17:5001
2019-03-21T13:00:22 ntpd[26975]: DNS: Server poking hole in restrictions for: 2604:a880:1:20::17:5001
2019-03-21T13:00:22 ntpd[26975]: DNS: dns_take_status: ntp1.glypnod.com=>good, 0
2019-03-21T13:00:22 ntpd[26975]: PROTO: 2604:a880:1:20::17:5001 a014 84 reachable
Don't I need OpenSSL Version 1.1.1 for TLS 1.3?
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
gem at rellim.com Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can’t measure it, you can’t improve it." - Lord Kelvin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: ntp.log
Type: text/x-log
Size: 730278 bytes
Desc: not available
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190321/05cab011/attachment-0002.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 851 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/devel/attachments/20190321/05cab011/attachment-0003.bin>
More information about the devel
mailing list