Hal Murray via devel <devel@ntpsec.org>: > > The server side needs a cookie and private key. > > The K and I used to encrypt cookies is a hack constant so old cookies work > over server reboots. > > The client side defaults to using the system root certificates. You can > provide your own. > > With the NTS flag, the client side tries NTS-KE, and drops into normal mode > if > that doesn't work. If it does work, it sends NTS packets until it runs out > of > cookies. Then it drops into normal mode. > > The code to ask for extra cookies doesn't exist yet. If it gets started, it > will run in NTS mode until 8 packets get lost.
Excellent. What's the bext thing you need from me? -- <a href="http://www.catb.org/~esr/">Eric S. Raymond</a> My work is funded by the Internet Civil Engineering Institute: https://icei.org Please visit their site and donate: the civilization you save might be your own. _______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel