[Git][NTPsec/ntpsec][master] docs: Gut mode 6 authentication section.

Hal Murray (@hal.murray) gitlab at mg.gitlab.com
Tue Nov 21 07:46:28 UTC 2023



Hal Murray pushed to branch master at NTPsec / ntpsec


Commits:
09e90f39 by James Browning at 2023-11-20T17:20:41-08:00
docs: Gut mode 6 authentication section.

- - - - -


1 changed file:

- docs/mode6.adoc


Changes:

=====================================
docs/mode6.adoc
=====================================
@@ -89,7 +89,7 @@ mode 6:
 |=====================================================================
 
 Requests to ntpd are single UDP packets; ntpd expects them to be
-padded to a 4-octet boundary.  Responses may be multiple UDP packets;
+padded to a 8-octet boundary.  Responses may be multiple UDP packets;
 they may arrive out of order, and the client is responsible for
 reassembling the payloads.
 
@@ -513,27 +513,17 @@ on that.
 [[auth]]
 == Authentication
 
-Authenticated requests require a MAC (message authentication code)
-trailer following the payload data, if any. Such requests must be
-padded to an 8-octet boundary, with those bytes not included in the
-header count field.
+Authenticated requests require a link:authentic.html#mac[MAC]
+(message authentication code) trailer following the payload data, if
+any. Pad Such requests to an 8-octet boundary, with those bytes not
+included in the header count field.
 
-The contents of the MAC trailer consists of:
+Ordinary requests with MACs will not receive a MAC with the
+response packet.
 
-1. The 32-bit identifier of the signing key in network byte order.
-
-2a. In digest mode, a cryptographic hash of the following octet spans,
-in order. First, the password entered to use the signing key, then the
-request header fields, then the payload.
-
-2b. In CMAC mode, a cryptographic hash of the packet header and
-payload with the crypto algorithim using the key.
-
-The cryptographic hash is 16 octets for MD5 ir AES-CMAC and AES and 20
-octets for SHA-1.  Longer digests are truncated.
-
-The key length for AES is 16 bytes.  Longer keys are truncated.  Shorter
-keys are padded with 0s.  MD5 and SHA-1 can use any key length.
+MD5 and SHA-1 are primarily available for legacy support.
+MD5 is deprecated by RFC 8573 and not usable for MACs on FIPS 140-2
+compliant systems.
 
 == Compatibility Notes
 



View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/09e90f39f0f535683451aa27cb48c986b487ee3f

-- 
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/-/commit/09e90f39f0f535683451aa27cb48c986b487ee3f
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20231121/35cb0b4f/attachment-0001.htm>


More information about the vc mailing list