David,

I beg to differ. The session key is a hash of the endpoint addresses, key identifier (which changes with every packet) and server private seed. The terrorist cannot predict the hash and cannot fake any field or guess the server private seed, which changes on a daily basis. Session keys are unpredictable, can't be faked and used only once. Replays of old keys are detected and discarded. Session keys are cryptographical bound to a signed certificate trail and group key.

Dave

David Schwartz wrote:

"Danny Mayer" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]


No it is not a flaw in the protocol design. It would be if it were put
in. The address doesn't belong there, it belongs in the IP header which
the receiving server always gets.


It is a flaw. Its absence requires the receiver to assume that the origin address of the UDP packet received is the IP address of the sending server. This assumption may or may not be correct. But if the address were in there, the assumption would not be needed.

    DS



_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to