<div dir="auto"><div><div class="gmail_quote"><div dir="ltr">On Sat, Jan 19, 2019, 4:30 PM Hal Murray via devel <<a href="mailto:devel@ntpsec.org">devel@ntpsec.org</a> wrote:<br></div><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><br>
> The NTS-KE servers would have to share NTS master keys (and cookie formats!)<br>
> with volunteer NTP servers.<br>
<br>
If you are interested in security, sharing a master key with many servers <br>
seems like a bad idea - too many opportunities for a leak. With something <br>
like the pool where anybody can join (and thus get the key), security is no <br>
longer possible.<br>
<br>
There are actually two parts to TLS security. One is the technical side. Can <br>
the crypto be broken? Has the secret key leaked? The other is trust. Do you <br>
trust the name you are using? The name you used could be a malicious clone of <br>
a legitimate name: F00 vs FOO. Or the correct company could be untrustworthy.<br>
<br>
The pool might be a good way to test NTS code. I don't see how to get a <br>
serious level of trust with volunteer effort.<br></blockquote></div></div><div dir="auto"><br></div><div dir="auto">"K" could be stored in another field in the database as it has no causal relation to the TLS keys or c2s/s2c. It would require updating such a field periodically either from a local process or a remote injection.</div><div dir="auto"><br></div><div dir="auto">I could try to fabricate a mockup if that would be clearer and/or more useful. </div><div dir="auto"><div class="gmail_quote"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
</blockquote></div></div></div>