On 2011-03-25, Chris Albertson <albertson.ch...@gmail.com> wrote:
>> NTP Authentication adds signatures to the packets. There is no
>> encryption.
>
> What are "signatures"?

Message Authenticator Code (MAC)

> How are they generated?

Search for 'hash' in:

http://www.ece.udel.edu/~mills/database/reports/stime1/stime.pdf

> Signatures are typically encrypted hashes of the message.

See section 4 (which starts on page 10).

"NTPv3 and NTPv4 symmetric key cryptography uses keyed-MD5 message
digests with a 128- bit private key and 32-bit key ID. In order to
retain backward compatibility with NTPv3, the NTPv4 key ID space is
partitioned in two subspaces at a pivot point of 65536. Symmetric key
IDs have values less than the pivot and indefinite lifetime. Autokey key
IDs have pseudo-random values equal to or greater than the pivot and
are expunged immediately after use. Both symmetric key and public key
cryptography authenticate as shown in Figure 1. The server looks up the
key associated with the key ID and calculates the message digest from
the NTP header and extension fields together with the key value. The key
ID and digest form the message authentication code (MAC) included with
the message. The client does the same computation using its local copy
of the key and compares the result with the digest in the MAC. If the
values agree, the message is assumed authentic."

-- 
Steve Kostecke <koste...@ntp.org>
NTP Public Services Project - http://support.ntp.org/

_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to