Hal Murray <hmur...@megapathdsl.net>:
> 
> > > That sounds uncomfortably plausible.  I can think of a workaround: add a
> > > padding extension long enough that the packet can't have any of the magic
> > > lengths. 
> > I've read that.  I've even implemented it myself once, in the Python
> > protocol back end.  Is there advice in there that I missed on how to avoid
> > magic-length interactions? 
> 
> It has a couple of minimum length constraints.  I think those are enough to 
> avoid the screwup cases.
> 
> Mostly, I pointed it out to show the complexities of that area, at least with 
> the current setup.  There may be room for something like NTPv4.1 which drops 
> compatibility with the old stuff that caused problems since it is rarely used.

And by "old stuff" I think you mean specifically Autokey, don't you?
To the extent I understand these length interactions from having coded
the Python support, I don't believe either MD5 or SHA-1 MACs are
implicated.

I think you're right.  The first thing to do about this is probably to
strengthen the non-interoperablity warnings around Autokey.
-- 
                <a href="http://www.catb.org/~esr/";>Eric S. Raymond</a>
_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to