> On 10/04/2023 3:41 PM PDT Hal Murray <halmur...@sonic.net> wrote:
> 
> 
> Does anybody have details on how MSSNTP signing works?
> 
> If we can find that, we can write some POSIX code to test things.

I have test tools that should push the right buttons IF I can get
the correct magic number in the key ID. After running it with a
rainbow table, it did not work.

Roughly...
1) The client does client things I should not have to care about
2) The client sends an NTP request with a magic key ID
   and 16-byte NUL MAC
3) after correctness checks, the server forms a reply and then
   sends it like this.
   a) ntpsec connects to Samba (works)
   b) ntpsec sends a length (tested/seems to work)
   c) ntpsec sends serialized struct samb_key_in.
   d) samba responds with a length (always 12 IIRC)
   e) samba continues with serialized struct samba_key_out
4) ntpsec reads that and concludes that the packet is not
   correctly signed and tries to throw a couple of new error
   messages.

> There is a link in ntpd/ntp_signd.c
> http://msdn.microsoft.com/en-us/library/cc212930.aspx
> But I didn't find anything interesting there. (Maybe my browser was filtering
> something.)

I see walls of text that I do not want to read.

> We still need to test with real Windows at least once to make sure our test
> code does the right thing.

Yes, I probably should.

-30-
_______________________________________________
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to