Danny,
Think of the message digest algorithm identifier as part of the key
defined in the keys file. Only the server and client know the key and
algorithm according to the key ID in the packet. There is no need for
negotiation and no need for the client to learn the digest algorithm
implicitly from the packet. Just to make life more interesting, in
Autokey the key is used only once. While not algorithm the
specification, there is no reason whey subsequent Autokey packets could
not use different digest algorithms.
I submit that NTP cryptographic vulnerability is a tough nut to crack.
Better a distributed DoS attack, then we get to talk about the rate
managment provisions and the KoD packet.
Dave
Danny Mayer wrote:
On 12/13/2011 11:56 PM, Dave Hart wrote:
Again you seem to be ignoring the point that a generic policy to avoid
MD5, or SHA1, is probably not applicable to NTP's use of those
algorithms. Fine, I'm not going to beat that drum anymore.
No, you are ignoring the point that when the government says don't use
MD5 or some other hashing algorithm in any software provided to the
government, you can't use it and you have to find a replacement for it.
Worse still some governments may say that you cannot use algorithm X.
Saying that it is probably not applicable is like sticking your head in
the sand; it doesn't solve the underlying problem.
You are mistaken in assuming ntpd detects the algorithm based on the
digest size. The algorithm is configured into both sides and not
communicated on the wire at all for symmetric authed NTP.
That assumes a lot, including the fact that each server communicating
with an single host may want to use different algorithms. Not signalling
which one is being used is a really bad idea and a very poor design.
Danny
_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc