[Git][NTPsec/ntpsec][master] Address GitLab bug #440: Inconsistency with key identifier size

Eric S. Raymond gitlab at mg.gitlab.com
Wed Aug 8 18:53:42 UTC 2018


Eric S. Raymond pushed to branch master at NTPsec / ntpsec


Commits:
ec3cbc09 by Eric S. Raymond at 2018-08-08T18:52:56Z
Address GitLab bug #440: Inconsistency with key identifier size

I audited RFC5905 and the code, verifting that the range of key IDs is
1-65535 - 32 bits unsigned, excluding zero.  I rthen went through the
documentation and made this limit uniform in the text.

I see that KEYID_T_MAX has already been removed.

- - - - -


5 changed files:

- docs/authentic.txt
- docs/includes/assoc-options.txt
- docs/includes/auth-commands.txt
- docs/includes/ntp.keys-body.txt
- docs/ntpkeygen.txt


Changes:

=====================================
docs/authentic.txt
=====================================
@@ -54,7 +54,7 @@ discarded.  Authentication doesn't prevent replays.
 [[symm]]
 === Symmetric-Key Cryptography ===
 
-NTP allows any one of possibly 65,534 keys, each distinguished by a
+NTP allows any one of possibly 65,535 keys, each distinguished by a
 32-bit key identifier, to authenticate an association. The servers and
 clients involved must agree on the key and key identifier to
 authenticate NTP packets. Keys and related information are specified
@@ -134,7 +134,7 @@ access to all but correctly authenticated clients.
 [[formats]]
 == Data Formats ==
 
-The NTPv4 specification (RFC 5905) allows any one of possibly 65,534
+The NTPv4 specification (RFC 5905) allows any one of possibly 65,535
 message digest keys (excluding zero), each distinguished by a 32-bit key
 ID, to authenticate an association. The servers and clients involved
 must agree on the key ID, key type and key to authenticate NTP packets.


=====================================
docs/includes/assoc-options.txt
=====================================
@@ -33,7 +33,7 @@
 +key+ _key_::
   All packets sent to and received from the server or peer are to
   include authentication fields encrypted using the specified _key_
-  identifier with values from 1 to 65534, inclusive. The default is to
+  identifier with values from 1 to 65535, inclusive. The default is to
   include no encryption field.
 
 +minpoll+ _minpoll_::


=====================================
docs/includes/auth-commands.txt
=====================================
@@ -5,7 +5,7 @@
   Specifies the key identifier to use with the
   {ntpqman} utility, which uses the standard protocol defined in
   RFC 5905. The _key_ argument is the key identifier for a trusted key,
-  where the value can be in the range 1 to 65,534, inclusive.
+  where the value can be in the range 1 to 65,535, inclusive.
 
 [[keys]]
 +keys+ _keyfile_::
@@ -28,6 +28,6 @@ The authentication procedures require that both the local and remote
 servers share the same key and key identifier for this purpose,
 although different keys can be used with different servers.
 The _key_ arguments are 32-bit unsigned integers with values from 1 to
-65,534.
+65,535.
 
 // end


=====================================
docs/includes/ntp.keys-body.txt
=====================================
@@ -7,7 +7,7 @@ Support" page of the Web documentation.
 {ntpdman} reads its keys from a file specified using the -k command line
 option or the 'keys' statement in the configuration file. While key
 number 0 is fixed by the NTP standard (as 56 zero bits) and may not be
-changed, one or more keys numbered between 1 and 65534 may be
+changed, one or more keys numbered between 1 and 65535 may be
 arbitrarily set in the keys file.
 
 The key file uses the same comment conventions as the configuration
@@ -17,7 +17,7 @@ file. Key entries use a fixed format of the form
 keyno type key
 --------------
 
-where `keyno` is a positive integer (between 1 and 65534),
+where `keyno` is a positive integer (between 1 and 65535),
 `type` is the message digest algorithm, and
 `key` is the key itself.
 


=====================================
docs/ntpkeygen.txt
=====================================
@@ -35,7 +35,7 @@ Figure 1. Typical Symmetric Key File
 
 Figure 1 shows a typical symmetric keys file used by the reference
 implementation. Each line of the file contains three fields, first
-keyno an integer between 1 and 65534, inclusive, representing the
+keyno an integer between 1 and 65535, inclusive, representing the
 key identifier used in the `server` configuration commands. Next
 is the key type for the message digest algorithm, which can be any
 message digest algorithm supported by the OpenSSL library.



View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/ec3cbc098f5c7a722e269f13e5fe1cb0cb33cdd1

-- 
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/ec3cbc098f5c7a722e269f13e5fe1cb0cb33cdd1
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20180808/ca29804f/attachment-0001.html>


More information about the vc mailing list