Yo Hal!

On Fri, 18 Jan 2019 16:58:31 -0800
Hal Murray via devel <devel@ntpsec.org> wrote:

> Gary said:
> > There is no TLS session between NTP client and NTP server.  UDP
> > only. And yet the NTP server must provide a new cookie every client
> > request. Since there is no TLS session, the master key used can not
> > be from the TLS session.   
> 
> The NTP server extracts S2C and C2S and AEAD number by using the
> master key to decrypt them from the cookie.  (That's the whole point
> of the cookie.) 


Yes!  And the point is?

> So it can use them to make new cookies.

No, you use the master key to make new cookies.

> > Here is another way.  If each connection used a different master
> > key, then the NTPD server would need to store state for each client
> > to know what master key to use.  Instead the NTPD server just
> > generates a new master key every day or so.   
> 
> I think you are confusing things with that use of "master key".

Yup, that is what I have been saying!

> Each TLS session sets up new working keys.

Yes, just for THAT session.  And only for NTS-KE connections.  No
NTPD client to NTPD server TLS session ever exists.

>  I'm not familiar with the details.

I am.

> More info in Richard's recent msg.

Which I disagreed with.

> Each end has whatever
> it takes to use RFC 5705 to make more keys without exchanging any
> packets.

Yes, each end has, as the Proposed RFC calls it: the current master key.

This master key is used to make new C2S and S2C as required, on demand.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgpWczdWJTgCv.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to