Danny Mayer wrote:
Brian Utterback wrote:

If that is a layering violation, then why do you need to know both the
source and destination address of each NTP packet to authenticate it?



I refer you to the autokey protocol.


Circular reasoning again. This is a "what is" argument. Couldn't the
autokey protocol be redesigned not to rely on the IP addresses?

--
blu

"Having them stolen may become our distribution model..."
Nicolas Negroponte on the Hundred Dollar Laptop.
----------------------------------------------------------------------
Brian Utterback - OP/N1 RPE, Sun Microsystems, Inc.
Ph:877-259-7345, Em:brian.utterback-at-ess-you-enn-dot-kom

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to