> > Ok, let me put it this way. I was trying to propose extending NTP to
> support having an arbitrary MAC size. I was also trying to 
> push HMAC-SHA-1, instead of the regular SHA-1.
> 
> That's one possibility. Another is SHA-2. That's why we need 
> to revisit the question.

Security vulnerabilities found in SHA-1 and SHA-2 don't apply to HMAC-SHA-1 and 
HMAC-SHA-2. I understand that the known attacks on SHA-1 and SHA-2 will not 
apply to NTP (like most IETF protocols) but that doesn't mean that we should go 
ahead using them. The security ADs I believe are insistent on the HMAC 
construct to be used. To cite an example, Bidirectional Forwarding Detection 
(BFD) protocol already supports SHA-1. It is however being upgraded to support 
the HMAC version of the SHA algorithms. I thus don't recommend going ahead with 
SHA-2.

Cheers, Manav
_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to