Re: Nonce Reuse (Was: Re: C2S/S2C lifetime)

2019-02-07 Thread Richard Laager via devel
On 2/3/19 9:50 AM, Richard Laager wrote: > On 2/3/19 12:34 AM, Richard Laager wrote: > So, given the current design of the NTS cookie replacement algorithm, > it's not going to be possible to _statelessly_ (which is a hard > requirement) maintain a counter-based nonce. I gave this some more thought

Re: Nonce Reuse (Was: Re: C2S/S2C lifetime)

2019-02-03 Thread Richard Laager via devel
On 2/3/19 12:34 AM, Richard Laager wrote: > For the server to client direction, we would have to store the counter > state in the cookie. Given that cookies are preallocated, this would > take _two_ numbers: the current counter value to use with that cookie > and the maximum counter valued issued.

Nonce Reuse (Was: Re: C2S/S2C lifetime)

2019-02-02 Thread Richard Laager via devel
Hal, does Daniel have any comment on the suitability of the new AES-GCM-SIV for cookies and/or NTP packets? Upon further research, even setting aside the message count topic, AES-GCM is probably inappropriate for the cookie encryption. The AES-GCM RFC (RFC 5116) says (page 13): The inad

Re: C2S/S2C lifetime

2019-02-02 Thread Richard Laager via devel
On 2/2/19 9:09 PM, Gary E. Miller via devel wrote: >> In the context of >> attacks on C2S/S2C, if the client willingly shares C2S/S2C in >> plaintext with someone else (other than the server), the client has >> already compromised C2S/S2C by its own actions. There is nothing in >> the protocol whic

Re: C2S/S2C lifetime

2019-02-02 Thread Gary E. Miller via devel
Yo Richard! On Sat, 2 Feb 2019 20:50:15 -0600 Richard Laager via devel wrote: > [I have re-ordered the quoted text to fit my response ordering.] > > On 2/2/19 7:13 PM, Gary E. Miller via devel wrote: > >> Hal's comments and the quote from Daniel are about whether it is > >> necessary to require

Re: C2S/S2C lifetime

2019-02-02 Thread Richard Laager via devel
[I have re-ordered the quoted text to fit my response ordering.] On 2/2/19 7:13 PM, Gary E. Miller via devel wrote: >> Hal's comments and the quote from Daniel are about whether it is >> necessary to require rotation of C2S/S2C, not K. > > Yes. This discussion was originally about why it is not

Re: C2S/S2C lifetime

2019-02-02 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Feb 2019 17:00:46 -0800 Hal Murray via devel wrote: > Gary said: > > The whole point is that the client knows the C2S and S2C. > > Otherwise he can not key a session to the NTPD server. That is the > > plaintext. And he has the cookie, with the algorithm use to make > > it.

Re: C2S/S2C lifetime

2019-02-02 Thread Gary E. Miller via devel
Yo Richard! On Sat, 2 Feb 2019 18:42:52 -0600 Richard Laager via devel wrote: > On 2/2/19 6:25 PM, Gary E. Miller via devel wrote: > > On Sat, 02 Feb 2019 16:15:49 -0800 > > Hal Murray wrote: > > > >> Gary said: > >>> Nothing says that a single cookie could not be used by a farm of > >>> c

Re: C2S/S2C lifetime

2019-02-02 Thread Hal Murray via devel
Gary said: > The whole point is that the client knows the C2S and S2C. Otherwise he can > not key a session to the NTPD server. That is the plaintext. And he has the > cookie, with the algorithm use to make it. That is the ciphertext. So if the client knows the C2S and S2C, what is he trying

Re: C2S/S2C lifetime

2019-02-02 Thread Richard Laager via devel
On 2/2/19 6:25 PM, Gary E. Miller via devel wrote: > On Sat, 02 Feb 2019 16:15:49 -0800 > Hal Murray wrote: > >> Gary said: >>> Nothing says that a single cookie could not be used by a farm of >>> clients to push the cookies per second into the thousands. >> >>> Then add that this is millions o

Re: C2S/S2C lifetime

2019-02-02 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Feb 2019 16:15:49 -0800 Hal Murray wrote: > Gary said: > > Nothing says that a single cookie could not be used by a farm of > > clients to push the cookies per second into the thousands. > > > Then add that this is millions of know plaintext and known > > ciphertext pairs T

C2S/S2C lifetime

2019-02-02 Thread Hal Murray via devel
Gary said: > Nothing says that a single cookie could not be used by a farm of clients to > push the cookies per second into the thousands. > Then add that this is millions of know plaintext and known ciphertext pairs > That is not what the key reuse calculations assume. I'm missing a step. Ho