Re: [ntp:questions] Autokey users - please read

2009-09-15 Thread Dave Hart
On Sep 10, 12:23 am, Harlan Stenn wrote: > https://support.ntp.org/bugs/show_bug.cgi?id=1243talks about a bug that > affects autokey users. > > We have a fix ready to go. > > There are 2 ways to go, however. > > One way is to just fix the problem, which will mean an "old" version of > ntpd will no

Re: [ntp:questions] Autokey users - please read

2009-09-12 Thread Todd Glassey
David Mills wrote: > Dave, > > Better do this quickly, cleanly and with minimum wiggle room. Otherwise, > somebody who doesn't know anything will call it a security flaw, call > the CERT and create an Incident. You mean like 2009-USCERTv33I7IQA... Todd > This has happened before when somebody

Re: [ntp:questions] Autokey users - please read

2009-09-12 Thread Todd Glassey
Dave Hart wrote: > On Fri, Sep 11, 2009 at 1:37 PM, Ryan Malayter wrote: > >> I don't use autokey in production, but I would also suggest that if >> the issue causes the reference implementation to violate RFCs and also >> creates a security issue with key shortening, it should be fixed >> witho

Re: [ntp:questions] Autokey users - please read

2009-09-12 Thread Todd Glassey
Ryan Malayter wrote: > I don't use autokey in production, but I would also suggest that if > the issue causes the reference implementation to violate RFCs and also > creates a security issue with key shortening, it should be fixed > without any options to go back to the bad behavior. Actually, the

Re: [ntp:questions] Autokey users - please read

2009-09-11 Thread David Mills
Dave, Better do this quickly, cleanly and with minimum wiggle room. Otherwise, somebody who doesn't know anything will call it a security flaw, call the CERT and create an Incident. This has happened before when somebody claimed a stack vulnerability which in fact was true in a most unlikely c

Re: [ntp:questions] Autokey users - please read

2009-09-11 Thread Dave Hart
On Fri, Sep 11, 2009 at 1:37 PM, Ryan Malayter wrote: > I don't use autokey in production, but I would also suggest that if > the issue causes the reference implementation to violate RFCs and also > creates a security issue with key shortening, it should be fixed > without any options to go back to

Re: [ntp:questions] Autokey users - please read

2009-09-11 Thread Ryan Malayter
I don't use autokey in production, but I would also suggest that if the issue causes the reference implementation to violate RFCs and also creates a security issue with key shortening, it should be fixed without any options to go back to the bad behavior. Actually, the security issue might in fact

Re: [ntp:questions] Autokey users - please read

2009-09-10 Thread David Mills
Harlan, Folks should understand this is a rather trivial fix to make sure autokeys are no shortened when a null byte is generated at random. The bug has been present since 1993. Thus, "old" version will interoperate as will "new" versions, but old and new will not. I would like to simplify th

[ntp:questions] Autokey users - please read

2009-09-09 Thread Harlan Stenn
https://support.ntp.org/bugs/show_bug.cgi?id=1243 talks about a bug that affects autokey users. We have a fix ready to go. There are 2 ways to go, however. One way is to just fix the problem, which will mean an "old" version of ntpd will not authenticate with a "new" version of ntpd. The other