mintls?

Rick Bollar newsletters at bollar.com
Thu Mar 12 13:09:04 UTC 2020


Thanks Hal,

It was an experiment that doesn't seem to have worked and I've since reverted to TLS 1.3. I can connect as a client to all of the NTS servers on my list, and usually have eight cookies. However, I have what seems like a high "wrong version number" failure rate when operating as a server:

2020-03-11T17:32:31 ntpd[5050]: NTSs: starting NTS-KE server listening on port 123
2020-03-11T17:32:31 ntpd[5050]: NTSs: loaded certificate (chain) from /etc/...
2020-03-11T17:32:31 ntpd[5050]: NTSs: loaded private key from /etc/...
2020-03-11T17:32:31 ntpd[5050]: NTSs: Private Key OK
2020-03-11T17:32:31 ntpd[5050]: NTSs: OpenSSL security level is 2
2020-03-11T17:32:31 ntpd[5050]: NTSs: listen4 worked
2020-03-11T17:32:31 ntpd[5050]: NTSs: listen6 worked
2020-03-11T17:36:40 ntpd[5050]: NTSs: SSL accept from 172.58.236.43:30410 failed: wrong version number, took 0.161 sec
2020-03-11T17:36:56 ntpd[5050]: NTSs: SSL accept from 172.58.236.43:45279 failed: wrong version number, took 0.105 sec
2020-03-11T17:37:39 ntpd[5050]: NTSs: SSL accept from 172.58.235.134:20923 failed: wrong version number, took 0.121 sec
2020-03-11T17:38:26 ntpd[5050]: NTSs: SSL accept from 172.58.235.134:49358 failed: wrong version number, took 0.116 sec
2020-03-11T22:53:25 ntpd[5050]: NTSs: SSL accept from 73.94.32.175:50275 failed: wrong version number, took 0.065 sec
2020-03-12T01:46:58 ntpd[5050]: NTSs: NTS-KE from 83.135.66.196:60104, Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256), took 0.526 sec
2020-03-12T05:29:53 ntpd[5050]: NTSs: SSL accept from 96.39.136.239:49153 failed: wrong version number, took 0.074 sec
2020-03-12T06:02:01 ntpd[5050]: NTSs: NTS-KE from 195.74.94.50:53622, Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256), took 0.518 sec
2020-03-12T06:02:16 ntpd[5050]: NTSs: NTS-KE from 188.210.44.50:60438, Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256), took 0.453 sec
2020-03-12T06:23:24 ntpd[5050]: NTSs: NTS-KE from 195.74.94.50:57434, Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256), took 0.501 sec
2020-03-12T06:23:46 ntpd[5050]: NTSs: NTS-KE from 188.210.44.50:45552, Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256), took 0.449 sec
2020-03-12T06:58:15 ntpd[5050]: NTSs: SSL accept from 107.11.213.209:34039 failed: wrong version number, took 0.132 sec
2020-03-12T07:13:18 ntpd[5050]: NTSs: SSL accept from 98.167.97.154:49156 failed: wrong version number, took 0.074 sec

     remote                                   refid      st t when poll reach   delay   offset   jitter
=======================================================================================================
oPPS(0)                                  .PPS.            0 l    1    1  377   0.0000   0.0006   0.0007
*SHM(1)                                  .GPSD.           1 l   12   16  377   0.0000   0.0003   0.0003
+time.cloudflare.com                     10.15.8.88       3 8  272 1024  377  21.9685  -2.3802   3.3376
-ntsts.sth.ntp.se                        194.58.202.20    2 6  46m 1024  104 155.7774   5.4018   1.2719
-ntp1.glypnod.com                        64.142.1.20      2 8  422 1024  377  68.7917   0.0204   0.9546
-nts1.time.nl                            94.198.159.10    2 6  38m 1024  104 145.0095  -2.7184   2.2529
-ntpmon.dcs1.biz                         .PPS.            1 8   41 1024  377 237.7880  13.5593   8.2662
+c-67-164-22-151.hsd1.ca.comcast.net     .PPS.            1 8  286 1024  377  78.8399  -2.1489   1.5073
 102.133.170.121                         146.64.58.41     2 u  371 1024  377 301.2170  -1.6712   1.3562
 time-b-wwv.nist.gov                     .NIST.           1 u  197 1024  377  44.0145   3.1387   2.0530
 usdal2-ntp-001.aaplimg.com              .SHM.            1 u  511 1024  377  20.8681   3.4903   1.0935
 time2.google.com                        .GOOG.           1 u  338 1024  377  45.3608  -0.8476   1.7814

2020-03-11T17:32:44 ntpd[5050]: NTSc: DNS lookup of ntp1.glypnod.com took 0.061 sec
2020-03-11T17:32:44 ntpd[5050]: NTSc: nts_probe connecting to ntp1.glypnod.com:123 => 104.131.155.175:123
2020-03-11T17:32:44 ntpd[5050]: NTSc: set cert host: ntp1.glypnod.com
2020-03-11T17:32:44 ntpd[5050]: NTSc: Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256)
2020-03-11T17:32:44 ntpd[5050]: NTSc: certificate subject name: /CN=ntp1.glypnod.com
2020-03-11T17:32:44 ntpd[5050]: NTSc: certificate issuer name: /C=US/O=Let's Encrypt/CN=Let's Encrypt Authority X3
2020-03-11T17:32:44 ntpd[5050]: NTSc: certificate is valid.
2020-03-11T17:32:44 ntpd[5050]: NTSc: Good ALPN from: ntp1.glypnod.com
2020-03-11T17:32:44 ntpd[5050]: NTSc: read 880 bytes
2020-03-11T17:32:44 ntpd[5050]: NTSc: Got 8 cookies, length 104, aead=15.
2020-03-11T17:32:44 ntpd[5050]: NTSc: NTS-KE req to ntp1.glypnod.com took 0.271 sec, OK

Rick

‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
On Thursday, March 12, 2020 5:09 AM, Hal Murray <hmurray at megapathdsl.net> wrote:

> > I've resolved some firewall issues and reduced mintls to 1.2.
> 

> One of the comments by reviewers was roughly "Why are you allowing TLS 1.2
> when there is nothing to be backward compatible with?"
> 

> I assume you are trying to talk to a system that is still running an old
> version of OpenSSL. Do you know what distro/OS/version?
> 

> 

> -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> 

> These are my opinions. I hate spam.

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 217 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ntpsec.org/pipermail/users/attachments/20200312/401895ed/attachment.bin>


More information about the users mailing list