Yo Daniel!

On Sat, 2 Mar 2019 09:40:30 -0500
Daniel Franke <dfoxfra...@gmail.com> wrote:

> On Fri, Mar 1, 2019 at 11:39 PM Gary E. Miller via devel
> <devel@ntpsec.org> wrote:
> > Not complete security, but at least encryption.  And there are
> > levels of validation.  If you are off net, you can't completely
> > validate the cert, but you can partially validate it.  Maybe you
> > would want to pin it.  
> 
> Encryption doesn't work without authentication; a MitM can cause you
> to negotiate keys with *him* instead of the endpoint you think you're
> communicating with.

Yes, but you seriously reduce the attack time window.  Instead of
a possible MitM every few seconds, you need to grab the one time the
cookies are shared.

> You can skip the notBefore/notAfter constraints under the
> circumstances described in the RFC.

Which should be a config option.

> Otherwise, either do full
> validation or don't bother with NTS at all. Pinning counts as full
> validation.

I'd be happy if we had per host pinning instead of "noval".

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgpTy3LvRTdTf.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to