[Git][NTPsec/ntpsec][master] 2 commits: clarify that pre-NTS-RFC-release ntpsec-version cannot talk to current NTS servers or clients.
James Browning (@jamesb_fe80)
gitlab at mg.gitlab.com
Tue Apr 12 11:13:21 UTC 2022
James Browning pushed to branch master at NTPsec / ntpsec
Commits:
febe31d2 by Michael Meier at 2022-04-12T11:05:53+00:00
clarify that pre-NTS-RFC-release ntpsec-version cannot talk to current NTS servers or clients.
- - - - -
8d6e7691 by Michael Meier at 2022-04-12T11:05:53+00:00
small correction to the version numbers supporting final-RFC8915-NTS.
- - - - -
1 changed file:
- docs/NTS-QuickStart.adoc
Changes:
=====================================
docs/NTS-QuickStart.adoc
=====================================
@@ -32,15 +32,23 @@ NTS is a method for using TLS/SSL to authenticate NTP traffic on the net.
That means that bad guys can't forge packets that will give your
system bogus time.
-The RFC hasn't been published yet (August 2020). Nothing has changed
-recently, but there may be minor adjustments when it is finalized.
+It is specified in RFC 8915, published in September 2020.
-Note: The NTP Pool does not currently support NTS.
+Note: The https://www.ntppool.org/[NTP Pool] does not currently support NTS.
It is strongly suggested that you get a "normal", unauthenticated,
NTP server working before enabling NTS. This may reduce the time
spent debugging. See the link:quick.adoc[Client Quick Start Guide].
+While NTPsec already supported NTS as RFC 8915 still was in the draft
+phase, there unfortunately were incompatible changes introduced shortly
+before it was published. As a result, while NTPsec-versions before 1.1.9
+do in principle support NTS, they cannot talk to any NTS servers or
+clients that implement the final RFC, which includes NTPsec-versions from
+1.1.9 onwards. And NTPsec 1.1.9 requires manually specifying the correct
+port number (4460), because it still defaulted to 123. 1.2.0 is the first
+version of NTPsec to fully support NTS as specified in RFC 8915.
+
[[client]]
== NTS Client Configuration
@@ -53,7 +61,8 @@ Public NTP servers supporting NTS:
------------------------------------------------------------
server time.cloudflare.com nts # Global, anycast
-server nts.ntp.se:4443 nts # Sweden
+server nts.ntp.se nts # Sweden
+server nts.ntp.se:4443 nts # Sweden: only for NTPsec <1.1.9
------------------------------------------------------------
These are development machines, so there may be gaps in availability:
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/compare/1a7bb2e3a2749bd709ea4cf10b66b6f6d05aaf9d...8d6e76914e284714d209518544dfaa51e267f58e
--
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/compare/1a7bb2e3a2749bd709ea4cf10b66b6f6d05aaf9d...8d6e76914e284714d209518544dfaa51e267f58e
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20220412/e8690d27/attachment-0001.htm>
More information about the vc
mailing list