Yo Hal! On Wed, 20 Mar 2019 15:22:33 -0700 Hal Murray via devel <[email protected]> wrote:
> Gary said:
> > Only if you figure out how to not have a huge daily rush to rekey.
>
> Under normal conditions, there is never any need to rekey.
We've gone around on that many times before. We disagree.
Using the same master key (with a ratchet) will eventually give the
attacker enought data to crack it. Maybe a long, long, time, but in
crypto a long, long, time always cmoes much sooner than expected.
> The server holds 2 cookie keys. When it makes a new key, the current
> key gets moved to the old key and the previous old key is lost.
So no ratchet? That would then be a rekey. A rekey not needing the
NTS-KE.
> Cookies using either the new or old key will work. When the client
> uses an old key, it gets back a new key. So as long as the client
> polling interval is fast enough, it gets new keys while all its old
> keys still work.
What does the spec say for the client to do with the old cookie
when it gets a new cookie?
> The keys are saved on disk so you can restart the server without
> rekey problems.
I guess we have to assume the NTPD host is secure...
> > Ah, Gentoo unstable updated to openssl 1.1.0j on March 6th.
> > Do I need any change in basic NTPsec build?
>
> It should just build and work.
I'll try it.
> The server ask, require, expire, cert, and ca options are not
> implemented.
Eventually.
> I wanted the ca option, but it's not simple to implement. I'll have
> to think about it.
Yeah, little is easy with openssl...
RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
[email protected] Tel:+1 541 382 8588
Veritas liberabit vos. -- Quid est veritas?
"If you can’t measure it, you can’t improve it." - Lord Kelvin
pgp46sMYFvCDo.pgp
Description: OpenPGP digital signature
_______________________________________________ devel mailing list [email protected] http://lists.ntpsec.org/mailman/listinfo/devel
