Danny Mayer wrote:
Brian Utterback wrote:
If that is a layering violation, then why do you need to know both the
source and destination address of each NTP packet to authenticate it?
I refer you to the autokey protocol.
Circular reasoning again. This is a "what is" argument. Couldn't the
autokey protocol be redesigned not to rely on the IP addresses?
--
blu
"Having them stolen may become our distribution model..."
Nicolas Negroponte on the Hundred Dollar Laptop.
----------------------------------------------------------------------
Brian Utterback - OP/N1 RPE, Sun Microsystems, Inc.
Ph:877-259-7345, Em:brian.utterback-at-ess-you-enn-dot-kom
_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions