Dear Richard,

I received yesterday a mail with a possible solution to configure Autokey with 
the NTP version 4.2.0b (see http://ntp.isc.org/Support/ConfiguringAutokey).

But I have some troubles to configure Autokey on my Windows machine.

When I use the nt-keygen on my test server, it creates 2 files:  - 
C:\WINDOWS\system32\drivers\etc\ntpkey_cert_wdmcswxp001
                                                                                
           - C:\WINDOWS\system32\drivers\etc\ntpkey_host_wdmcswxp001
Use the ntpd service this 2 files to transmit a secure NTP package to the 
public time servers? 
I generate a crypto file from the website https://ntp.isc.org/crypto.php. The 
file size is 0KB and it contains nothing. Is that correct?

NTP.log file:
20 Mar 23:39:11 ntpd.exe[4412]: logging to file C:\Program 
Files\NTP\etc\ntp.log 
20 Mar 23:39:11 ntpd.exe[4412]: precision = 0.798 usec 
20 Mar 23:39:11 ntpd.exe[4412]: Listening on interface wildcard, 0.0.0.0#123 
Disabled 
20 Mar 23:39:11 ntpd.exe[4412]: Listening on interface IP Interface 1, 
192.168.1.135#123 Enabled 
20 Mar 23:39:11 ntpd.exe[4412]: Listening on interface Loopback Interface 2, 
127.0.0.1#123 Enabled 
20 Mar 23:39:11 ntpd.exe[4412]: frequency initialized 10.211 PPM from 
C:\Program Files\NTP\etc\ntp.drift 
20 Mar 23:39:11 ntpd.exe[4412]: frequency initialized 10.211 PPM from 
C:\Program Files\NTP\etc\ntp.drift 
20 Mar 23:39:11 ntpd.exe[4412]: crypto_key error:06065064:digital envelope 
routines:EVP_DecryptFinal_ex:bad decrypt
20 Mar 23:39:11 ntpd.exe[4412]: crypto_setup: host key file 
ntpkey_host_wdmcswxp001 not found or corrupt 20 Mar 23:39:11 ntpd.exe[4412]: 
The Network Time Protocol Service has stopped.

NTP.conf file:
# NTP Network Time Protocol
# Configuration File created by Windows Binary Distribution Installer Rev.: 
1.16  mbg # please check http://www.ntp.org for additional documentation and 
background information crypto pw Cindy33Patrice keysdir 
"C:\Windows\System32\Drivers\etc"


# Use drift file 
driftfile "C:\Program Files\NTP\etc\ntp.drift"

# your local system clock, should be used as a backup
# (this is only useful if you need to distribute time no matter how good or bad 
it is)
#server 127.127.1.0
# but it operates at a high stratum level to let the clients know and force 
them to
# use any other timesource they may have.
#fudge 127.127.1.0 stratum 12

# Use a NTP server from the ntp pool project (see http://www.pool.ntp.org)
# Please note that you need at least four different servers to be at least 
protected against
# one falseticker. If you only rely on internet time, it is highly recommended 
to add
# additional servers here. 
# The 'iburst' keyword speeds up initial synchronization, please check the 
documentation for more details!
 server be.pool.ntp.org autokey
 server nl.pool.ntp.org autokey
 server fr.pool.ntp.org autokey


# End of generated ntp.conf --- Please edit this to suite your needs

What's wrong with my configuration; Can you help me?

Greetz,

Patrice
 

"Richard B. Gilbert" <[EMAIL PROTECTED]> wrote in message news:[EMAIL PROTECTED]
> news.telenet.be wrote:
>> Dear Dr. Mills
>> 
>> I installed the NTP version 4.2.0 from the meinberg.de website. This Time 
>> syncronization service works fine on a test server. Thank you David for your 
>> reply.
>> 
>> Unfortunatly, I didn't find information about the configuration of a secure 
>> connection to the public time servers with ESP, AH or MD5. You suggest on 
>> the website of the University of Delaware to use the Autokey security 
>> Architecture, Protocol and Algorithms 
>> (http://www.eecis.udel.edu/~mills/database/reports/stime1/stime.pdf).
>> But I'm a bit confused about Autokey! How do I use this application with the 
>> NTP version 4.2.0 for Windows to transmit secure NTP requests to the public 
>> time servers? Where can I find this application?
>> 
>> Best regards,
>> 
>> Patrice
> 
> I think you may misunderstand Autokey security.
> 
> All Autokey, or any of the other encryption systems does for you, is to 
> authenticate the server to the client.  It gives you some assurance that 
> the server sending the packet really is who he claims to be.  The packet 
> has an encrypted signature.  Anybody can read the request packet and 
> anybody can read the reply packet.  After all, there is nothing secret 
> about the correct time, your IP address, the server's IP address, etc.
_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.isc.org/mailman/listinfo/questions

Reply via email to