[Git][NTPsec/ntpsec][master] Bug 569: Fix the broken links
Matt Selsky
gitlab at mg.gitlab.com
Sat Mar 9 18:36:55 UTC 2019
Matt Selsky pushed to branch master at NTPsec / ntpsec
Commits:
6b9894a9 by James Browning at 2019-03-09T18:33:39Z
Bug 569: Fix the broken links
- - - - -
1 changed file:
- docs/standards.adoc
Changes:
=====================================
docs/standards.adoc
=====================================
@@ -11,32 +11,32 @@ include::html.include[]
== Overview of relevant standards
The principal standard informing the NTPsec software is
-https://tools.ietf.org/html/rfc5905[RFC 5905: Network Time Protocol
+link:https://tools.ietf.org/html/rfc5905[RFC 5905: Network Time Protocol
Version 4: Protocol and Algorithms Specification].
-SNTP is specified by https://tools.ietf.org/html/rfc2030[RFC 2030:
+SNTP is specified by link:https://tools.ietf.org/html/rfc2030[RFC 2030:
Simple Network Time Protocol (SNTP) Version 4 for IPv4, IPv6 and OSI].
Extension fields are described by
-https://tools.ietf.org/html/rfc5905[RFC 7822: Network Time Protocol
+link:https://tools.ietf.org/html/rfc5905[RFC 7822: Network Time Protocol
Version 4 (NTPv4) Extension Fields].
NTPsec has entirely dropped conformance with the Autokey feature
-described in https://tools.ietf.org/html/rfc5905[RFC 5906]. Autokey
+described in link:https://tools.ietf.org/html/rfc5905[RFC 5906]. Autokey
never quite worked, and the design was unstable enough that if there
was ever actually a time when it fully conformed to its RFC that span
must have been pretty short.
-Older NTP RFCs such as https://tools.ietf.org/html/rfc1305[RFC 1305]
+Older NTP RFCs such as link:https://tools.ietf.org/html/rfc1305[RFC 1305]
are no longer relevant.
-https://tools.ietf.org/rfc/rfc5297.txt[RFC 5297] describes the
+link:https://tools.ietf.org/rfc/rfc5297.txt[RFC 5297] describes the
authenticated encryption used in Network Time Security
key exchanges.
Network Time Security does not yet have a final fully accepted
RFC. The NTPsec implementation is based on the
-draft-ietf-ntp-using-nts-for-ntp-17[version 17 draft].
+link:https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-17[version 17 draft].
[[against5905]]
== Divergences from RFC 5905
@@ -56,12 +56,12 @@ MD5 or AES-CMAC digest) is not the only possible length for the MAC. This was
a pre-NTPsec change present in NTP Classic versions after 2010.
NTPsec conforms to the
-https://datatracker.ietf.org/doc/draft-ietf-ntp-data-minimization/[NTP
+link:https://datatracker.ietf.org/doc/draft-ietf-ntp-data-minimization/[NTP
Client Data Minimization] draft RFC, which changes the client-side
generation of some packet headers.
NTPsec also conforms to the
-https://datatracker.ietf.org/doc/draft-ietf-ntp-mac/[MAC for NTP]
+link:https://datatracker.ietf.org/doc/draft-ietf-ntp-mac/[MAC for NTP]
draft RFC, implementing AES-CMAC (128 bits).
The table of reference identifiers in Figure 12 is largely obsolete
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/6b9894a908877fd4406e9f0300ad64a76263e95a
--
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/6b9894a908877fd4406e9f0300ad64a76263e95a
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20190309/7483e38a/attachment-0001.html>
More information about the vc
mailing list