[Git][NTPsec/ntpsec][master] Typo fixes in nts.adoc.

Eric S. Raymond gitlab at mg.gitlab.com
Thu Jan 17 17:34:28 UTC 2019


Eric S. Raymond pushed to branch master at NTPsec / ntpsec


Commits:
64ec8cc4 by Eric S. Raymond at 2019-01-17T16:51:48Z
Typo fixes in nts.adoc.

- - - - -


1 changed file:

- devel/nts.adoc


Changes:

=====================================
devel/nts.adoc
=====================================
@@ -19,7 +19,7 @@ The NTS implementation shall:
 The NTP server maintains no per-client state.  The NTP client
 stores the state in a cookie which is sent with each request.
 The cookie is provided by the server.  The server will decrypt
-it to revover the session keys.
+it to revolver the session keys.
 
 NTS should not assist tracking of the client.  (Consider
 a laptop that moves from home to work to a coffee shop.)
@@ -44,8 +44,8 @@ separate programs for debugging.
    Alpha                       Charlie
    NTP client ---------------- NTP server
 
-NTP-C to NTS-C (Alpha to Bravo) is pretty simple.
-  NTP-C sends:
+NTP-client to NTS-client (Alpha to Bravo) is pretty simple.
+  NTP-client sends:
     Host name of NTS-KE server
     Optional preferred IP Address 4.1.7
     A sorted list of AEAD algorithms 4.1.5
@@ -58,18 +58,18 @@ NTP-C to NTS-C (Alpha to Bravo) is pretty simple.
 For AEAD, we need libaes_siv.so, RFC 5297
 It's available, but not in OpenSSL yet
 
-NTS-C-NTS-S (Bravo to Delta) is mostly the above in TLS over TCP.
-NTS-C has to make the C2S and S2C keys.  They are tangled up
+NTS-client-NTS-server (Bravo to Delta) is mostly the above in TLS over TCP.
+NTS-client has to make the C2S and S2C keys.  They are tangled up
 with TLS.
 
-NTP-S to NTS-S (Charlie to Delta) Is very low bandwidth.
+NTP-server to NTS-server (Charlie to Delta) Is very low bandwidth.
 It's just the master key which is updated daily.
 NB: That channel has to be encrypted/protected.
 
 We could also send the initial cookies over that channel
-so that only NTP-S knows the cookie format.
+so that only NTP-server knows the cookie format.
 
-NTP-C to NTP-S (Alpha to Charlie)
+NTP-client to NTP-server (Alpha to Charlie)
 
 If all goes well (no lost packets) the client sends:
   The normal 48 byte NTP packet
@@ -102,8 +102,8 @@ NTS makes use of three keys:
 * NTS Master Key
 
 Because one of the goals of NTS is to not require any per-client state in
-the servers, the server (both NTPD and NTS-KE) does not posess either of the
-c2s/s2c pair. The servers do posess the NTS Master Key, which is expected to
+the servers, the server (both NTPD and NTS-KE) does not possess either of the
+c2s/s2c pair. The servers do possess the NTS Master Key, which is expected to
 be updated somewhat regularly.
 
 The c2s/s2c pair is created during the TLS handshake between client and NTS-KE.



View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/64ec8cc4b1eb3f5967ff3aa29d7a42dd5c3a6e2d

-- 
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/64ec8cc4b1eb3f5967ff3aa29d7a42dd5c3a6e2d
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20190117/515a775a/attachment-0001.html>


More information about the vc mailing list