Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Eric! On Mon, 14 Jan 2019 22:26:54 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > > Why are you fighting so hard for the reuse case? > > > > Because the Proposed RFC allows for it, so some will use it. We > > need to be interroperable. It may be useful for bad connection

Re: NTS keys as I understand them

2019-01-14 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > > Why are you fighting so hard for the reuse case? > > Because the Proposed RFC allows for it, so some will use it. We need to > be interroperable. It may be useful for bad connections. While I concded your point that we need to plan for interoperability, Gary, I'm

Re: ntpd: program structure

2019-01-14 Thread Eric S. Raymond via devel
Hal Murray : > > > Good to know. Yeah, NTP at that volume is sure not going to saturate even a > > smartphone, let alone anything you'd put in a desktop or server case. > > I can get 20k pkt/s through a Pi 3. So, to a reasonable first approximation, a RasPi 3 could handle PTB's load with 50% h

Re: ntpd: program structure

2019-01-14 Thread Hal Murray via devel
> Good to know. Yeah, NTP at that volume is sure not going to saturate even a > smartphone, let alone anything you'd put in a desktop or server case. I can get 20k pkt/s through a Pi 3. There is an interesting quirk in this area. Suppose you have a traffic generator with a knob on it, and y

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 14:19:00 -0800 Hal Murray via devel wrote: > > Seems to me that reuse is in the spirit of the draft. And not a > > corner case, a very simple basic case. The sort of thing a minimal > > client would do. > > It's a corner case in the sense that half the document w

Re: ntpd: program structure

2019-01-14 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Answer from PTB: Current packet rate is still lower than 10k/s peak over > all three servers. Not sure how well balanced that is, but I guess it's > safe to say that it's less than 5k/s on each server. Good to know. Yeah, NTP at that volume is sure not going to saturate

Re: NTS keys as I understand them

2019-01-14 Thread Hal Murray via devel
> Seems to me that reuse is in the spirit of the draft. And not a corner case, > a very simple basic case. The sort of thing a minimal client would do. It's a corner case in the sense that half the document wouldn't be needed if the designers thought that was normal. We aren't dealing with a

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 13:30:03 -0800 Hal Murray wrote: > Gary said: > > One is sufficient for that. Cookie reuse is fine. > > Cookie reuse is fine in the sense that it should work. But the whole > tone of the draft is that they won't be reused. There is only a > minor note that says

Re: NTS keys as I understand them

2019-01-14 Thread Hal Murray via devel
> While I don't know what the rationale was for the RFC, it still makes sense > to provide a client with enough cookies so it can fire off the initial burst > w/o re-keying even if all responses get lost. The NTS-KE section has a SHOULD return 8 keys, but only 1 is required. -- These are my

Re: NTS keys as I understand them

2019-01-14 Thread Hal Murray via devel
Gary said: > One is sufficient for that. Cookie reuse is fine. Cookie reuse is fine in the sense that it should work. But the whole tone of the draft is that they won't be reused. There is only a minor note that says you can reuse them. I think we should follow the spirit of the draft rath

Re: More word to nts.adoc

2019-01-14 Thread Gary E. Miller via devel
Yo James! On Mon, 14 Jan 2019 13:01:27 -0800 James Browning via devel wrote: > > > When the NTP server is returning new cookies to the client, they > > > are encrypted so that a spy can't track the client if it moves to > > > a new IP Address before it uses the cookie. > > > > I see nothing in

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 12:58:00 -0800 Hal Murray via devel wrote: > > Why would a client waste all is cookies at once? Since they can be > > reused until the NTPD returns a NACK this seems to ddefeat the > > benefit of keeping spare cookies around. > > To avoid bad-guys tracking you wh

Re: More word to nts.adoc

2019-01-14 Thread James Browning via devel
On Mon, Jan 14, 2019, 12:30 PM Gary E. Miller via devel Yo Hal! > > On Mon, 14 Jan 2019 12:19:09 -0800 > Hal Murray via devel wrote: > > > When the NTP server is returning new cookies to the client, they are > > encrypted so that a spy can't track the client if it moves to a new > > IP Address be

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Achim! On Mon, 14 Jan 2019 21:54:03 +0100 Achim Gratz via devel wrote: > Hal Murray via devel writes: > >> BTW, the number eight is not arbitrary: that is exactly the number > >> of packets a burst poll would use. > > > > The normal case is that the client gets back a response before it >

Re: NTS keys as I understand them

2019-01-14 Thread Hal Murray via devel
> Why would a client waste all is cookies at once? Since they can be reused > until the NTPD returns a NACK this seems to ddefeat the benefit of keeping > spare cookies around. To avoid bad-guys tracking you when you change IP Addresses. The NTP client gets a new cookie with each response. I

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 12:45:58 -0800 Hal Murray via devel wrote: > > It is actually allowed to re-use cookies, specifically if it wants > > to avoid that re-keying. Whether that's a good idea is debatable, > > but the server doesn't know either way and the decision is up to > > the client

Re: NTS keys as I understand them

2019-01-14 Thread Achim Gratz via devel
Hal Murray via devel writes: >> BTW, the number eight is not arbitrary: that is exactly the number of packets >> a burst poll would use. > > The normal case is that the client gets back a response before it sends the > next request in the burst, so it only needs 1 cookie to start with. While I d

Re: NTS keys as I understand them

2019-01-14 Thread Hal Murray via devel
> It is actually allowed to re-use cookies, specifically if it wants to avoid > that re-keying. Whether that's a good idea is debatable, but the server > doesn't know either way and the decision is up to the client. Right. I think we should make a "no reuse" decision. We want that option for

Re: NTS keys as I understand them

2019-01-14 Thread Gary E. Miller via devel
Yo Achim! On Mon, 14 Jan 2019 21:32:29 +0100 Achim Gratz via devel wrote: > BTW, the number eight is not arbitrary: that is exactly the number of > packets a burst poll would use. Why would a client waste all is cookies at once? Since they can be reused until the NTPD returns a NACK this seems

Re: NTS keys as I understand them

2019-01-14 Thread Achim Gratz via devel
Hal Murray via devel writes: > The client starts with 8 cookies. If a packet gets lost, the next request > includes a single cookie-please slot. The server returns an extra cookie so > the client is back to 8. The cookie-please slot has the same length as a > cookie slot so you can't use cook

Re: More word to nts.adoc

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 12:19:09 -0800 Hal Murray via devel wrote: > When the NTP server is returning new cookies to the client, they are > encrypted so that a spy can't track the client if it moves to a new > IP Address before it uses the cookie. I see nothing in the Proposed RFC that bind

Re: More word to nts.adoc

2019-01-14 Thread Achim Gratz via devel
Hal Murray via devel writes: >> Not only, any data in encrypted extension fields that goes back to the server >> is encrypted with the c2s key (from the P portion of the paylod in section >> 5.6 of the RFC). > > The cyphertext of figure 4 contains both the encrypted version of any headers > we wan

Re: More word to nts.adoc

2019-01-14 Thread Hal Murray via devel
> Not only, any data in encrypted extension fields that goes back to the server > is encrypted with the c2s key (from the P portion of the paylod in section > 5.6 of the RFC). The cyphertext of figure 4 contains both the encrypted version of any headers we want to encrypt and the authentication

Re: ntpd: program structure

2019-01-14 Thread Achim Gratz via devel
Achim Gratz via devel writes: > Eric S. Raymond via devel writes: >> Achim Gratz via devel : >>> I could try to contact the responsible person for NTP at PTB if you >>> can't get at information from NIST. >> >> Probably a good idea to have PTB figures even if we *can* get some from NIST. […] > By t

Re: More word to nts.adoc

2019-01-14 Thread Gary E. Miller via devel
Yo Hal! On Mon, 14 Jan 2019 03:50:49 -0800 Hal Murray via devel wrote: > You said "encrypts the rest of the data" > I think we are authenticating rather than encrypting. Check out the definition of AEAD. It is an encrypt, then hash, function. So you get both. Plus the option of some unencrypt

Re: More word to nts.adoc

2019-01-14 Thread Achim Gratz via devel
Hal Murray via devel writes: > You said "encrypts the rest of the data" > I think we are authenticating rather than encrypting. Not only, any data in encrypted extension fields that goes back to the server is encrypted with the c2s key (from the P portion of the paylod in section 5.6 of the RFC).

Re: NTPsec 1.1.3 has been released. https://blog.ntpsec.org/2019/01/13/version-1.1.3.html

2019-01-14 Thread Eric S. Raymond via devel
Udo van den Heuvel via devel : > On 14-01-19 08:14, Mark Atwood via devel wrote: > > NTPsec 1.1.3 has been released. > > https://blog.ntpsec.org/2019/01/13/version-1.1.3.html > > Thanks. > > The pic directory in the source tree holds the panda.adoc file that > should be located one level higher

Re: NTPsec 1.1.3 has been released. https://blog.ntpsec.org/2019/01/13/version-1.1.3.html

2019-01-14 Thread Udo van den Heuvel via devel
On 14-01-19 08:14, Mark Atwood via devel wrote: > NTPsec 1.1.3 has been released. > https://blog.ntpsec.org/2019/01/13/version-1.1.3.html Thanks. The pic directory in the source tree holds the panda.adoc file that should be located one level higher I guess. Kind regards, Udo _

More word to nts.adoc

2019-01-14 Thread Hal Murray via devel
I've started adding references to the draft. Ian: I didn't touch your recent edits. You said "encrypts the rest of the data" I think we are authenticating rather than encrypting. The new cookies returned from the NTP server are encrypted. I think that's at a different layer. The AEAD stuff