Thanks Harlan for your comments. So for a while we have no better option
than NTP Autokey for authentication.
Joe
On Mon, Apr 4, 2016 at 9:34 PM, Harlan Stenn wrote:
> Joe Smithian writes:
>
> > Thanks all for your comments. Good to know that NTPSec is coming. When do
> > you expect NTPSec be av
Joe Smithian writes:
> Thanks all for your comments. Good to know that NTPSec is coming. When do
> you expect NTPSec be available in major Linux distributions such as Red Hat
> and Ubuntu?
NTS is Network Time Security.
NTPsec is ... not. And it's off-topic here.
NTS will be in the NTP.org dist
Thanks all for your comments. Good to know that NTPSec is coming. When do
you expect NTPSec be available in major Linux distributions such as Red Hat
and Ubuntu?
Joe
On Thu, Mar 24, 2016 at 3:40 AM, Harlan Stenn wrote:
> Danny Mayer writes:
> > On 3/21/2016 12:11 PM, Joe Smithian wrote:
> > > H
Danny Mayer writes:
> On 3/21/2016 12:11 PM, Joe Smithian wrote:
> > H All,
> >
> > I am surprised that NTP still supports insecure algorithms such as MD2, MD5
> > and small key sizes 256,512,1024 in the Autokey authentication! Any plan
> > to deprecate weak algorithms and add more secure algorit
On 3/21/2016 12:11 PM, Joe Smithian wrote:
> H All,
>
> I am surprised that NTP still supports insecure algorithms such as MD2, MD5
> and small key sizes 256,512,1024 in the Autokey authentication! Any plan
> to deprecate weak algorithms and add more secure algorithms such as SHA-2
> and SHA-3?
>
Harlan Stenn wrote:
> Joe Smithian writes:
>> H All,
>>
>> I am surprised that NTP still supports insecure algorithms such as MD2, MD5
>> and small key sizes 256,512,1024 in the Autokey authentication! Any plan
>> to deprecate weak algorithms and add more secure algorithms such as SHA-2
>> and SHA
Joe Smithian writes:
> H All,
>
> I am surprised that NTP still supports insecure algorithms such as MD2, MD5
> and small key sizes 256,512,1024 in the Autokey authentication! Any plan
> to deprecate weak algorithms and add more secure algorithms such as SHA-2
> and SHA-3?
As I mentioned in anot
Brian Inglis writes:
> Hopefully the NTPSEC project https://www.ntpsec.org/ will be able to address
> those issues.
> See https://gitlab.com/groups/NTPsec mirror at https://github.com/ntpsec/ntps
> ec
You're pretty funny, Brian.
Nobody should be using autokey anymore. We're well into the
implem
Hopefully the NTPSEC project https://www.ntpsec.org/ will be able to address
those issues.
See https://gitlab.com/groups/NTPsec mirror at https://github.com/ntpsec/ntpsec
On 2016-03-21 10:11, Joe Smithian wrote:
H All,
I am surprised that NTP still supports insecure algorithms such as MD2, MD5
H All,
I am surprised that NTP still supports insecure algorithms such as MD2, MD5
and small key sizes 256,512,1024 in the Autokey authentication! Any plan
to deprecate weak algorithms and add more secure algorithms such as SHA-2
and SHA-3?
Below is a list of supported keys and algorithms in nt
10 matches
Mail list logo