Re: What's left to doo on NTS

2019-03-06 Thread Daniel Franke via devel
A different RFC, eventually. But I'm not in a rush. Let people managing large scale deployments figure out what works for them and then standardize around it later. On Wed, Mar 6, 2019, 13:25 Achim Gratz via devel wrote: > Daniel Franke via devel writes: > > That's correct: ensuring interop betw

Re: What's left to doo on NTS

2019-03-06 Thread Achim Gratz via devel
Daniel Franke via devel writes: > That's correct: ensuring interop between differing implementations of the > NTS-KE server and the NTP server is outside the scope of this document. So what are the plans for that department? Have everything bloom into chaos or put it into a different RFC? Regar

Re: What's left to doo on NTS

2019-03-06 Thread Daniel Franke via devel
On Wed, Mar 6, 2019, 03:33 Hal Murray wrote: > > dfoxfra...@gmail.com said: > > The intended design for running NTS with pool servers is that only the > pool > > operator runs an NTS-KE server. The NTS-KE server then picks an > NTS-enabled > > NTP server out of the pool and serves you an appropri

Re: What's left to doo on NTS

2019-03-06 Thread Hal Murray via devel
dfoxfra...@gmail.com said: > The intended design for running NTS with pool servers is that only the pool > operator runs an NTS-KE server. The NTS-KE server then picks an NTS-enabled > NTP server out of the pool and serves you an appropriate NTPv4 Server > Negotiation Record. Individual server op

Re: What's left to doo on NTS

2019-03-05 Thread Achim Gratz via devel
Daniel Franke via devel writes: > The intended design for running NTS with pool servers is that only the > pool operator runs an NTS-KE server. The NTS-KE server then picks an > NTS-enabled NTP server out of the pool and serves you an appropriate > NTPv4 Server Negotiation Record. Individual server

Re: What's left to doo on NTS

2019-03-05 Thread Achim Gratz via devel
Hal Murray via devel writes: > Gary said: >>> I would assume that critical infrastructure would be run in a less >>> insecure environment. >> Bad assumption. Just look at any data center. There is no way to secure >> customer machines. Unless you get rid of the customers. > > Right. But why wo

Re: What's left to doo on NTS

2019-03-05 Thread Hal Murray via devel
> The intended design for running NTS with pool servers is that only the pool > operator runs an NTS-KE server. The NTS-KE server then picks an NTS-enabled > NTP server out of the pool and serves you an appropriate NTPv4 Server > Negotiation Record. Individual server operators, on a one-time basi

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Matthew! On Mon, 4 Mar 2019 21:35:14 + Matthew Selsky wrote: > On Mon, Mar 04, 2019 at 12:11:07PM -0800, Gary E. Miller via devel > wrote: > > > Given the Comodo mess of last week I expect a lot more people will > > want to do pinning next month. > > Do you have a reference for this m

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Daniel! On Mon, 4 Mar 2019 16:32:33 -0500 Daniel Franke wrote: > On Mon, Mar 4, 2019 at 4:28 PM Gary E. Miller via devel > wrote: > > The name in ntp.conf MUST match the name in the cert. Unless you > > override it ("noval", pin, etc.). > > > > > The normal getaddrinfo and friends automa

Re: What's left to doo on NTS

2019-03-04 Thread Matthew Selsky via devel
On Mon, Mar 04, 2019 at 12:11:07PM -0800, Gary E. Miller via devel wrote: > Given the Comodo mess of last week I expect a lot more people will want to > do pinning next month. Do you have a reference for this mess? Thanks, -Matt ___ devel mailing list

Re: What's left to doo on NTS

2019-03-04 Thread Daniel Franke via devel
On Mon, Mar 4, 2019 at 4:28 PM Gary E. Miller via devel wrote: > The name in ntp.conf MUST match the name in the cert. Unless you > override it ("noval", pin, etc.). > > > The normal getaddrinfo and friends automatically follow CNAMEs. > > Thus my comment about needing some DNS code. > > Which o

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Hal! On Mon, 04 Mar 2019 12:58:14 -0800 Hal Murray via devel wrote: > rlaa...@wiktel.com said: > > CNAMEs don't really help. Certificate validation uses the original > > name anyway. > > I was assuming we could intercept the CNAME and use that for > certificate validation. Maybe I should

Re: What's left to doo on NTS

2019-03-04 Thread Daniel Franke via devel
The intended design for running NTS with pool servers is that only the pool operator runs an NTS-KE server. The NTS-KE server then picks an NTS-enabled NTP server out of the pool and serves you an appropriate NTPv4 Server Negotiation Record. Individual server operators, on a one-time basis, establi

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
rlaa...@wiktel.com said: > CNAMEs don't really help. Certificate validation uses the original name > anyway. I was assuming we could intercept the CNAME and use that for certificate validation. Maybe I should have said SRV or TXT or ??? The normal getaddrinfo and friends automatically follow

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Hal! On Mon, 04 Mar 2019 12:46:27 -0800 Hal Murray via devel wrote: > Gary said: > >> I would assume that critical infrastructure would be run in a less > >> insecure environment. > > Bad assumption. Just look at any data center. There is no way to > > secure customer machines. Unless yo

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
Gary said: >> I would assume that critical infrastructure would be run in a less >> insecure environment. > Bad assumption. Just look at any data center. There is no way to secure > customer machines. Unless you get rid of the customers. Right. But why would you run your NTS-KE server on a

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Hal! On Mon, 04 Mar 2019 01:58:23 -0800 Hal Murray via devel wrote: > Gary said: > >> Otherwise, either do full validation or don't bother with NTS > >> at all. Pinning counts as full validation. > > > I'd be happy if we had per host pinning instead of "noval". > > How is per-host pinn

Re: What's left to doo on NTS

2019-03-04 Thread Gary E. Miller via devel
Yo Hal! On Mon, 04 Mar 2019 02:11:04 -0800 Hal Murray via devel wrote: > Gary said: > > Think data center. The data center controls the LAN, but the > > customers control what is in the containers. Or the hacker that > > used the latest Wordpress bug to take over the contrainer. And > > break

Re: What's left to doo on NTS

2019-03-04 Thread Achim Gratz via devel
Hal Murray via devel writes: >>> There is no security in the pool anyway, so let's put that discussion >>> aside for a while. >> I'd take exception with that statement. If the pool was upgraded to use NTS >> one way or the other, it _would_ provide some extra security over the status >> quo. It's

Re: What's left to doo on NTS

2019-03-04 Thread Achim Gratz via devel
Kurt Roeckx via devel writes: > There currently isn't a protocol defined between the NTP server > and the NTS-KE. This would mean that if you want to use it with > the pool that such a protocol would need to be defined. A more practical solution until that's been hashed out is to require an NTS ma

Re: What's left to doo on NTS

2019-03-04 Thread Richard Laager via devel
On 3/4/19 3:46 AM, Hal Murray via devel wrote: > Plan A is to give all the servers the certificate and private key for > time.nist.gov and do the load sharing via traditional DNS rotation. The > disadvantage with that is that there are many copies of the private key out > there. One leak and t

Re: What's left to doo on NTS

2019-03-04 Thread Eric S. Raymond via devel
Hal Murray via devel : > Eric said: > > Trying to change that by breaking out a separate NTS-KE server would > > introduce a lot of complexity when we could achieve the same result by > > pointing the ntpd instances at a common key on a fileshare. > > That adds the fileshare to the security tangl

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
Gary said: > Think data center. The data center controls the LAN, but the customers > control what is in the containers. Or the hacker that used the latest > Wordpress bug to take over the contrainer. And breaking out of a container > to infect the motherboard is not that hard. I would assum

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
Eric said: > Trying to change that by breaking out a separate NTS-KE server would > introduce a lot of complexity when we could achieve the same result by > pointing the ntpd instances at a common key on a fileshare. That adds the fileshare to the security tangle and probably complicates the sta

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
Gary said: >> Otherwise, either do full validation or don't bother with NTS >> at all. Pinning counts as full validation. > I'd be happy if we had per host pinning instead of "noval". How is per-host pinning normally implemented? We have the option to use a local file of trusted/root certific

Re: What's left to doo on NTS

2019-03-04 Thread Hal Murray via devel
>> There is no security in the pool anyway, so let's put that discussion >> aside for a while. > I'd take exception with that statement. If the pool was upgraded to use NTS > one way or the other, it _would_ provide some extra security over the status > quo. It's a different kind of security th

Re: What's left to doo on NTS

2019-03-03 Thread Hal Murray via devel
> We've established not so long ago that a single NTP server can serve a lot of > clients. The number of servers is driven by the network topology more > likely, i.e. say you want one NTP server per network span or subnet, so the > server has low latency to each of its clients and doesn't send p

Re: What's left to doo on NTS.

2019-03-03 Thread Gary E. Miller via devel
Yo Kurt! On Mon, 4 Mar 2019 00:35:24 +0100 Kurt Roeckx wrote: > > > But it is present in chrony. It supports both interleaved mode > > > and hardware timestamping. > > > > I'm looking for it, but can not find it. Can you point out where? > > > > I do see that chronyd has a "PTP hardware clo

Re: What's left to doo on NTS.

2019-03-03 Thread Kurt Roeckx via devel
On Sun, Mar 03, 2019 at 03:30:53PM -0800, Gary E. Miller via devel wrote: > Yo Kurt! > > On Mon, 4 Mar 2019 00:19:44 +0100 > Kurt Roeckx via devel wrote: > > > > Actually getting timestamps from the NIC is fairly involved. The NIC > > > has its own clock and its own oscillator, which has to care

Re: What's left to doo on NTS.

2019-03-03 Thread Gary E. Miller via devel
Yo Kurt! On Mon, 4 Mar 2019 00:19:44 +0100 Kurt Roeckx via devel wrote: > > Actually getting timestamps from the NIC is fairly involved. The NIC > > has its own clock and its own oscillator, which has to carefully be > > kept in sync with the system clock. Furthermore, all the APIs for > > doing

Re: What's left to doo on NTS.

2019-03-03 Thread Kurt Roeckx via devel
On Sun, Mar 03, 2019 at 05:59:11PM -0500, Daniel Franke wrote: > On Sun, Mar 3, 2019 at 8:45 AM Kurt Roeckx via devel wrote: > > On Sun, Mar 03, 2019 at 05:23:31AM -0800, Hal Murray wrote: > > > > > > k...@roeckx.be said: > > > > If this is something you're worried about, this can be solved with t

Re: What's left to doo on NTS.

2019-03-03 Thread Daniel Franke via devel
On Sun, Mar 3, 2019 at 8:45 AM Kurt Roeckx via devel wrote: > On Sun, Mar 03, 2019 at 05:23:31AM -0800, Hal Murray wrote: > > > > k...@roeckx.be said: > > > If this is something you're worried about, this can be solved with the > > > interleave mode, which was removed. > > > > How well does it wor

Re: What's left to doo on NTS.

2019-03-03 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Mar 2019 22:45:05 -0800 Hal Murray via devel wrote: > Gary said: > >> Which ones do you intend to relax? And in any case you don't need a > >> whole CA, you can pin a self-signed cert and still do full > >> validation on it. > > Except we can't. The current NTPsec code does

Re: What's left to doo on NTS

2019-03-03 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Mar 2019 23:49:14 -0800 Hal Murray via devel wrote: > devel@ntpsec.org said: > > Partial validation means you don't follow the cert chain to the > > root. In the off-net scenario, it means you stop folloing the chain > > when you'd have to go outside the network perimeter you'

Re: What's left to doo on NTS

2019-03-03 Thread Kurt Roeckx via devel
On Sun, Mar 03, 2019 at 10:25:31PM +0100, Achim Gratz via devel wrote: > Kurt Roeckx via devel writes: > > I don't see how it can work with the current pool system. You look > > something up like pool.ntp.org and get some IP addresses. But none > > of those will have a certificate for pool.ntp.org,

Re: What's left to doo on NTS

2019-03-03 Thread Achim Gratz via devel
Kurt Roeckx via devel writes: > I don't see how it can work with the current pool system. You look > something up like pool.ntp.org and get some IP addresses. But none > of those will have a certificate for pool.ntp.org, so the > verification of the certificate will fail. You will still look up a

Re: What's left to doo on NTS

2019-03-03 Thread Kurt Roeckx via devel
On Sun, Mar 03, 2019 at 08:56:55PM +0100, Achim Gratz via devel wrote: > Hal Murray via devel writes: > > There is no security in the pool anyway, so let's put that discussion > > aside for a while. > > I'd take exception with that statement. If the pool was upgraded to use > NTS one way or the o

Re: What's left to doo on NTS

2019-03-03 Thread Achim Gratz via devel
Hal Murray via devel writes: > I thought most systems came with a collection of trusted/root certificates. > What do I have to go outside-the-network to get? You'll have to check the cert chain until you hit one of those trust anchors that can't be otherwise checked since they're the start of th

Re: What's left to doo on NTS

2019-03-03 Thread Achim Gratz via devel
Hal Murray via devel writes: > There is no security in the pool anyway, so let's put that discussion > aside for a while. I'd take exception with that statement. If the pool was upgraded to use NTS one way or the other, it _would_ provide some extra security over the status quo. It's a different

Re: What's left to doo on NTS.

2019-03-03 Thread Eric S. Raymond via devel
Kurt Roeckx : > If this is something you're worried about, this can be solved with > the interleave mode, which was removed. The interleave move was removed because it was broken. There was a small but fatal error in the packet construction. I don't remember the details, but Damiel Franke did it

Re: What's left to doo on NTS.

2019-03-03 Thread Eric S. Raymond via devel
Hal Murray : > > Let me take a different tack: can we move the aut computation off path? > > Nope. The auth includes the whole packet. Can't do the auth until you know > the time that you are going to put in the packet. I was expecting that answer, but the question hd to be asked. > We can me

Re: What's left to doo on NTS.

2019-03-03 Thread Kurt Roeckx via devel
On Sun, Mar 03, 2019 at 05:23:31AM -0800, Hal Murray wrote: > > k...@roeckx.be said: > > If this is something you're worried about, this can be solved with the > > interleave mode, which was removed. > > How well does it work? It works great, the errors are much smaller when it's enabled. > Is

Re: What's left to doo on NTS.

2019-03-03 Thread Hal Murray via devel
k...@roeckx.be said: > If this is something you're worried about, this can be solved with the > interleave mode, which was removed. How well does it work? Is there an option to get a kernel timestamp on transmit packets? -- These are my opinions. I hate spam. ___

Re: What's left to doo on NTS.

2019-03-03 Thread Kurt Roeckx via devel
On Sat, Mar 02, 2019 at 09:23:51PM -0800, Hal Murray via devel wrote: > *) There is actually one interesting point that authentication makes more > interesting. On receive, we get a time stamp when the packet arrives. We > can > take all day to inspect the packet and run authentication code.

Re: What's left to doo on NTS.

2019-03-03 Thread Hal Murray via devel
> Let me take a different tack: can we move the aut computation off path? Nope. The auth includes the whole packet. Can't do the auth until you know the time that you are going to put in the packet. We can measure how long it takes and advance the time to compensate. -- These are my opinions

Re: What's left to doo on NTS.

2019-03-03 Thread Eric S. Raymond via devel
Hal Murray : > > e...@thyrsus.com said: > >> My big concern is that nobody else seems to be testing it. There may be > >> dragons that I haven't poked. > > Understood. Unfortunately I myself can't be much help here - my outside > > view > > of NTP is still weak, I have only limited ability to

Re: What's left to doo on NTS

2019-03-02 Thread Hal Murray via devel
devel@ntpsec.org said: > Partial validation means you don't follow the cert chain to the root. In the > off-net scenario, it means you stop folloing the chain when you'd have to go > outside the network perimeter you're in. ... > https://www.owasp.org/index.php/Certificate_and_Public_Key_Pinnin

Re: What's left to doo on NTS

2019-03-02 Thread Hal Murray via devel
Achim Gratz said: >> Why do we need a standalone NTS-KE server? > Because you only want one NTS-KE per any number of ntpd on a large fleet of > hardware (think a warehouse full of compute racks) and of course the NTP pool > servers will not work with NTS any other way. There is no security in t

Re: What's left to doo on NTS.

2019-03-02 Thread Hal Murray via devel
Gary said: >> Which ones do you intend to relax? And in any case you don't need a >> whole CA, you can pin a self-signed cert and still do full validation >> on it. > Except we can't. The current NTPsec code does not support any cert > fanciness. For some value of "any" or "fancy". You can pr

Re: What's left to doo on NTS.

2019-03-02 Thread Hal Murray via devel
e...@thyrsus.com said: >> My big concern is that nobody else seems to be testing it. There may be >> dragons that I haven't poked. > Understood. Unfortunately I myself can't be much help here - my outside view > of NTP is still weak, I have only limited ability to recognize what normal > opera

Re: What's left to doo on NTS.

2019-03-02 Thread Gary E. Miller via devel
Yo Daniel! On Fri, 1 Mar 2019 23:59:22 -0500 Daniel Franke wrote: > Which ones do you intend to relax? And in any case you don't need a > whole CA, you can pin a self-signed cert and still do full validation > on it. Except we can't. The current NTPsec code does not support any cert fanciness.

Re: What's left to doo on NTS

2019-03-02 Thread Gary E. Miller via devel
Yo Hal! On Fri, 01 Mar 2019 21:46:56 -0800 Hal Murray via devel wrote: > Gary said: > > Because that is the initial use case. If each ntpd had nts-ke in > > it then there would be no need for such a complicated protocol. > > > The way Mark explained it to me, you want one NTS-KE per aisle, o

Re: What's left to doo on NTS

2019-03-02 Thread Gary E. Miller via devel
Yo Eric! On Sat, 2 Mar 2019 12:52:49 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > > > The way Mark explained it to me, you want one NTS-KE per aisle, > > > > or per rack. That limits the number of servers, with keys, > > > > that need to be protected. > > > > > > I now t

Re: What's left to doo on NTS

2019-03-02 Thread Daniel Franke via devel
On Sat, Mar 2, 2019 at 12:36 PM Gary E. Miller via devel wrote: > Yes, but you seriously reduce the attack time window. Instead of > a possible MitM every few seconds, you need to grab the one time the > cookies are shared. No you don't, because a MitM who appears at any time can drop time packe

Re: What's left to doo on NTS

2019-03-02 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > > > The way Mark explained it to me, you want one NTS-KE per aisle, or > > > per rack. That limits the number of servers, with keys, that need > > > to be protected. > > > > I now think this plan is a mistake and that Hal did the right thing by > > building key serv

Re: What's left to doo on NTS

2019-03-02 Thread Gary E. Miller via devel
Yo Daniel! On Sat, 2 Mar 2019 09:40:30 -0500 Daniel Franke wrote: > On Fri, Mar 1, 2019 at 11:39 PM Gary E. Miller via devel > wrote: > > Not complete security, but at least encryption. And there are > > levels of validation. If you are off net, you can't completely > > validate the cert, but

Re: What's left to doo on NTS

2019-03-02 Thread Gary E. Miller via devel
Yo Eric! On Sat, 2 Mar 2019 11:36:03 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > The way Mark explained it to me, you want one NTS-KE per aisle, or > > per rack. That limits the number of servers, with keys, that need > > to be protected. > > I now think this plan is a mi

Re: What's left to doo on NTS.

2019-03-02 Thread Eric S. Raymond via devel
Hal Murray : > > Eric said: > >> I've been collecting major items in devel/TODO-NTS > > Is there some reason this isn't just a section in nts.adoc? (Which may need > > some GC at this point.) The whole idea of that document was to be a planning > > whiteboard. > > Only signal to noise. I was t

Re: What's left to doo on NTS

2019-03-02 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > The way Mark explained it to me, you want one NTS-KE per aisle, or > per rack. That limits the number of servers, with keys, that need > to be protected. I now think this plan is a mistake and that Hal did the right thing by building key service into ntpd itself. Try

Re: What's left to doo on NTS.

2019-03-02 Thread Eric S. Raymond via devel
Hal Murray : > > I'll take responsibility for the documentation. > > Thanks. > > Be sure to include a section that says that NTS doesn't guarantee good time, > just that you are talking to the system you expect to talk to. (modulo typos > and such) That's true of all three forms of authentica

Re: What's left to doo on NTS

2019-03-02 Thread Achim Gratz via devel
Hal Murray via devel writes: >> Not complete security, but at least encryption. And there are levels of >> validation. If you are off net, you can't completely validate the cert, but >> you can partially validate it. Maybe you would want to pin it. > > What does partial validation mean? What do

Re: What's left to doo on NTS

2019-03-02 Thread Achim Gratz via devel
Hal Murray via devel writes: > Gary said: >> It is missing key rotation. Also how to share keys between standalone NTS-KE >> and NTPD. > > Why do we need a standalone NTS-KE server? Because you only want one NTS-KE per any number of ntpd on a large fleet of hardware (think a warehouse full of com

Re: What's left to doo on NTS

2019-03-02 Thread Daniel Franke via devel
On Fri, Mar 1, 2019 at 11:39 PM Gary E. Miller via devel wrote: > Not complete security, but at least encryption. And there are > levels of validation. If you are off net, you can't completely > validate the cert, but you can partially validate it. Maybe you > would want to pin it. Encryption

Re: What's left to doo on NTS.

2019-03-01 Thread Hal Murray via devel
> I'll take responsibility for the documentation. Thanks. Be sure to include a section that says that NTS doesn't guarantee good time, just that you are talking to the system you expect to talk to. (modulo typos and such) -- These are my opinions. I hate spam. ___

Re: What's left to doo on NTS

2019-03-01 Thread Hal Murray via devel
> And the NTS-KE and NTPD are NOT on the same host? No. I misinterpreted your question. >> I don't understand that use case. Without checking the certificate, >> you have no real security. > Not complete security, but at least encryption. And there are levels of > validation. If you are off

Re: What's left to doo on NTS

2019-03-01 Thread Hal Murray via devel
Gary said: > Because that is the initial use case. If each ntpd had nts-ke in it then > there would be no need for such a complicated protocol. > The way Mark explained it to me, you want one NTS-KE per aisle, or per rack. > That limits the number of servers, with keys, that need to be protecte

Re: What's left to doo on NTS.

2019-03-01 Thread Daniel Franke via devel
Which ones do you intend to relax? And in any case you don't need a whole CA, you can pin a self-signed cert and still do full validation on it. On Fri, Mar 1, 2019, 23:41 Gary E. Miller via devel wrote: > Yo Daniel! > > On Fri, 1 Mar 2019 21:26:15 -0500 > Daniel Franke wrote: > > > On Fri, Mar

Re: What's left to doo on NTS.

2019-03-01 Thread Gary E. Miller via devel
Yo Daniel! On Fri, 1 Mar 2019 21:26:15 -0500 Daniel Franke wrote: > On Fri, Mar 1, 2019 at 7:01 PM Gary E. Miller via devel > wrote: > > "noval" is not mostly for debugging. It is essential for off > > network operation. > > There's no point in doing NTS if you're not doing certificate > va

Re: What's left to doo on NTS

2019-03-01 Thread Gary E. Miller via devel
Yo Hal! On Fri, 01 Mar 2019 19:55:15 -0800 Hal Murray via devel wrote: > Gary said: > > It is missing key rotation. Also how to share keys between > > standalone NTS-KE and NTPD. > > Why do we need a standalone NTS-KE server? Because that is the initial use case. If each ntpd had nts-ke in

Re: What's left to doo on NTS

2019-03-01 Thread Hal Murray via devel
Gary said: > It is missing key rotation. Also how to share keys between standalone NTS-KE > and NTPD. Why do we need a standalone NTS-KE server? > Gary said: > "noval" is not mostly for debugging. It is essential for off network > operation. I don't understand that use case. Without checkin

Re: What's left to doo on NTS.

2019-03-01 Thread Daniel Franke via devel
On Fri, Mar 1, 2019 at 7:01 PM Gary E. Miller via devel wrote: > "noval" is not mostly for debugging. It is essential for off > network operation. There's no point in doing NTS if you're not doing certificate validation. The result isn't any more secure than unauthenticated NTP.

Re: What's left to doo on NTS.

2019-03-01 Thread Hal Murray via devel
Eric said: >> I've been collecting major items in devel/TODO-NTS > Is there some reason this isn't just a section in nts.adoc? (Which may need > some GC at this point.) The whole idea of that document was to be a planning > whiteboard. Only signal to noise. I was trying to capture the big ide

Re: What's left to doo on NTS.

2019-03-01 Thread Eric S. Raymond via devel
Hal Murray : > > > What still needs to be done to fully land this feature? Key rotation? > > Anything else? > > I've been collecting major items in devel/TODO-NTS Is there some reason this isn't just a section in nts.adoc? (Which may need some GC at this point.) The whole idea of that document

Re: What's left to doo on NTS.

2019-03-01 Thread Gary E. Miller via devel
Yo Hal! On Fri, 01 Mar 2019 15:46:49 -0800 Hal Murray via devel wrote: > > What still needs to be done to fully land this feature? Key > > rotation? Anything else? > > I've been collecting major items in devel/TODO-NTS It is missing key rotation. Also how to share keys between standalone NT

Re: What's left to doo on NTS.

2019-03-01 Thread Hal Murray via devel
> What still needs to be done to fully land this feature? Key rotation? > Anything else? I've been collecting major items in devel/TODO-NTS Mostly, it needs testing and probably an overview level documentation. Something high level rather than the details of how to configure it. Maybe a HOW