(Apologies for this duplicate mail... I am still trying to figure out this 
mailing list usage)
Thank you for your response. I am not a cryptography expert either - so perhaps 
crypto experts even from Microsoft may have a different take on this.
 >The RFC does specifically say that "Server implementations... MUST support 
 >AEAD_AES_SIV_CMAC_256." (RFC 8915, section 4.1.
This is a requirement for standards compliant implementation no doubt, but 
limiting an implementation to only this algorithm type seems to limit the 
flexibility made available in NTS-KE AEAD algorithm negotiation (also in 
Section 4.1.5 of RFC 8915).
I can give one more compelling reason for this proposal besides finding 
matching algorithms between OpenSSL and SymCrypt libraries.
Based on my (admittedly limited) reading, NTS-NTP appears to be the primary RFC 
taking a dependency on AES_SIV_CMAC algorithms. The additional algorithms 
suggested for inclusion see widespread use and have common name recognition 
among administrators and users, in addition to being common to both OpenSSL and 
SymCrypt libraries. Adding support for these algorithms will give users a 
choice of readily recognizable crypto algorithms and in my opinion, help lower 
the barriers for adoption of NTS-NTP protocol.
RFC8915 is an important protocol and standards-compliant implementations 
further interoperability.  Having said that, I am unable to comment on future 
releases from Microsoft at this time.
-Sarath

_______________________________________________
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to