[Git][NTPsec/ntpsec][master] Add Martin Langer's notes, reorganize.
Eric S. Raymond
gitlab at mg.gitlab.com
Tue Feb 5 14:39:42 UTC 2019
Eric S. Raymond pushed to branch master at NTPsec / ntpsec
Commits:
52536ed6 by Eric S. Raymond at 2019-02-05T14:39:31Z
Add Martin Langer's notes, reorganize.
- - - - -
1 changed file:
- devel/nts.adoc
Changes:
=====================================
devel/nts.adoc
=====================================
@@ -431,6 +431,18 @@ The binary KE request-response format is unfortunate for all the usual
reasons (endianness issues etc). At the expected transaction volume,
the encode/decode overhead shouldn't be an issue.
+link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-4.1.3[4.1.3], link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-4.1.4[4.1.4]
+
+Is the response in case of abuse 'continue the abuse, just wait a minute'?
+
+link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-5.7[5.7]
+
+Does the unique identifier extension need to be omniversally unique?
+
+Why are the timestamps, unique identifier extension etc. seemingly not tamper resisted?
+
+Can NTSN and other KODs get signed?
+
== NTS/mode 7 next
=== NTS and mode 6 and 7
@@ -439,12 +451,13 @@ Network Time Security explicitly only supports modes 3 and 4 at this time.
I see no reason why NTS could not be expanded to cover modes 1, 2, 6, and 7.
Expansion to cover modes 6&7 should require an authentication token extension.
-
=== mode 6 -> mode 7 next
-I feel that in keeping with comments. It should be possible to shift a copy of mode 6 to UTF-8 JSON-RPC and rebadge it as a new mode 7.
-The following is an overly verbose partial mockup of a transaction chain querying peer-stats.
-All the numbers should be in _decimal_ without the hexadecimal timestamps and such.
+I feel that in keeping with comments. It should be possible to shift a
+copy of mode 6 to UTF-8 JSON-RPC and rebadge it as a new mode 7. The
+following is an overly verbose partial mockup of a transaction chain
+querying peer-stats. All the numbers should be in _decimal_ without
+the hexadecimal timestamps and such.
[source, json]
----
@@ -556,14 +569,20 @@ All the numbers should be in _decimal_ without the hexadecimal timestamps and su
...
----
+== Martin Langer's notes ==
-=== link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-4.1.3[4.1.3], link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-4.1.4[4.1.4]
+um... maybe the first hint... The current OpenSSL version doesn't
+work with NTS and TLS1.3. The TLS key exporter function fails
+because the exporter label is too long. It's an OpenSSL bug which is
+already committed and fixed. The next OpenSSL version 1.1.1b should
+work again.
-Is the response in case of abuse 'continue the abuse, just wait a minute'?
+This is my current workaround:
-=== link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp#section-5.7[5.7]
-Does the unique identifier extension need to be omniversally unique?
-
-Why are The timestamps, unique identifier extension etc. seemingly not tamper resisted?
+--
+// TODO: bug in OpenSSL 1.1.1a --> "EXPORTER-network-time-security/1"
+// doesn't work.
+#define *TLS_Exporter_Labe**l* **"EXPORTER-nts/1"
+--
-Can NTSN and other KODs get signed?
+// end
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/52536ed60e319a5c3918b4cf1eef3df21788ec86
--
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/52536ed60e319a5c3918b4cf1eef3df21788ec86
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20190205/e16ff7c9/attachment-0001.html>
More information about the vc
mailing list