On 3/30/2020 2:01 AM, Ragnar Sundblad wrote: > > >> On 30 Mar 2020, at 08:18, Saku Ytti <s...@ytti.fi> wrote: >> >> On Mon, 30 Mar 2020 at 01:58, Ragnar Sundblad <ra...@kth.se> wrote: >> >>> A protocol with varying packet size, as the NTS protected NTP is, >>> can easily have the bad property of having responses larger than the >>> requests if not taken care. Don’t you see that? >> >> Why? Why not pad requests to guarantee attenuation vector until >> authenticity of packets can be verified? > > Right, and NTS does that.
There is more to NTP than NTS. Are y'all seriously recommending that NTP always sends a max-sized packet as a client request so the client/server can send back an identical response? The alternative seems to be that the client sends a smaller request and is ready when the response from the server is "Send your request again, but this time pad it to NNN bytes so I can respond with the same sized packet"? > Ragnar -- Harlan Stenn <st...@nwtime.org> http://networktimefoundation.org - be a member!