On 4/20/20 3:22 AM, Hal Murray via devel wrote:
> 
> One of the last changes to the draft NTS RFC was to change the string 
> constant 
> used to make the keys that are used to encrypt and authenticate the NTP+NTS 
> traffic.
> 
> There isn't any easy way to make a backwards compatible update.
> 
> The symptoms of incompatible versions are that the NTS-KE step will appear to 
> work but the client and server will be using different keys so the NTP+NTS 
> traffic won't work.  The client will use up all 8 cookies then start over 
> with 
> another NTS-KE step.
> 
> Old cookies will continue to work until you restart the client and it gets 
> new 
> cookies.  I expect to be able to restart the server with nothing worse than 
> dropping a packet or two.
> 
> The Cloudflare servers were updated a while ago.  (This is why they aren't 
> working if you are using NTS.)
> 
> Miroslav Lichvar (chrony) and I are planning to ship updated code and restart 
> servers roughly Monday midnight, UTC.  (Late afternoon, Pacific time.)  I'll 
> send another message when I've pushed the button.

By Monday, do you mean today (in which case midnight UTC has passed but
maybe you mean what is technically Tuesday 00:00) or a week from now?

Is the patch available now? If so, can you share it?

Is there a particular reason that the code push (as opposed to
operational deployment) needs to be super tightly coordinated? If not,
can you just push it now?

-- 
Richard

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to