Re: ntp.conf changes for NTS

2019-02-03 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> > > But if no packets are lost, C2S and S2C will be used forever. >> > >> > Yeah, bad. >> >> What you almost need is a cookie extension to trigger a rekeying >> periodically. > > Yes. Sad the Proposed RFC is silent on the subject. Seems a gaping > hole to

Re: ntp.conf changes for NTS

2019-02-03 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> Again, it supports it exactly the same way as the pool is currently >> working with DNS: You want another server, you ask another time. > > Exactly why it is broken. No crypto. Unless you mean having an NTS-KE > server manage a pool. in chich case there is zero

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo James! On Sat, 2 Feb 2019 18:39:56 -0800 James Browning via devel wrote: > > I assume you mane this: > > Yep, this is it. Good, we're getting on the same page. > > Good. More correct to say stop using the same C2S/S2C > > Sometime after I wrote that I have the idea of using an MJD nu

Re: ntp.conf changes for NTS

2019-02-02 Thread James Browning via devel
On 2/2/19, Gary E. Miller via devel wrote: > Yo James! > > On Sat, 2 Feb 2019 13:44:12 -0800 > James Browning via devel wrote: > >> >> What you almost need is a cookie extension to trigger a rekeying >> >> periodically. >> > >> > Yes. Sad the Proposed RFC is silent on the subject. Seems a gapin

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo James! On Sat, 2 Feb 2019 13:44:12 -0800 James Browning via devel wrote: > >> What you almost need is a cookie extension to trigger a rekeying > >> periodically. > > > > Yes. Sad the Proposed RFC is silent on the subject. Seems a gaping > > hole to me. > > > >> You might want to look at

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo Richard! On Sat, 2 Feb 2019 17:57:12 -0600 Richard Laager via devel wrote: > On 2/2/19 3:29 PM, Gary E. Miller via devel wrote: > > Nothing says that a single cookie could not be used by a farm of > > clients to push the cookies per second into the thousands. > > The cookie, or more import

Re: ntp.conf changes for NTS

2019-02-02 Thread Richard Laager via devel
On 2/2/19 3:29 PM, Gary E. Miller via devel wrote: > Nothing says that a single cookie could not be used by a farm of > clients to push the cookies per second into the thousands. The cookie, or more importantly the C2S and S2C inside of it, which is what we are discussing here, comes from a single

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo Achim! On Sat, 02 Feb 2019 09:32:34 +0100 Achim Gratz via devel wrote: > Gary E. Miller via devel writes: > >> I think there is a reasonable parallel between get another server > >> via DNS and get another server via NTS-KE. > > > > Yes, except the protocol, as defined in the Proposed RFC,

Re: ntp.conf changes for NTS

2019-02-02 Thread James Browning via devel
On 2/2/19, Gary E. Miller via devel wrote: > Yo James! > > On Sat, 2 Feb 2019 13:04:25 -0800 > James Browning via devel wrote: > >> > > But if no packets are lost, C2S and S2C will be used forever. >> > >> > Yeah, bad. >> >> >> What you almost need is a cookie extension to trigger a rekeying >> p

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Feb 2019 02:33:56 -0800 Hal Murray via devel wrote: > The per client-server pair of keys, C2S and S2C don't roll over as > long as the connection works reasonably well. I asked about key > lifetime on the NTP list and Daniel said we don't have to worry about > it. > https://m

Re: ntp.conf changes for NTS

2019-02-02 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Yo James! > > On Sat, 2 Feb 2019 13:04:25 -0800 > James Browning via devel wrote: > > > > > But if no packets are lost, C2S and S2C will be used forever. > > > > > > Yeah, bad. > > > > > > What you almost need is a cookie extension to trigger a rekeying > > per

Re: ntp.conf changes for NTS

2019-02-02 Thread James Browning via devel
On Sat, Feb 2, 2019, 12:46 PM Gary E. Miller via devel Yo Hal! > > On Sat, 02 Feb 2019 12:36:10 -0800 > Hal Murray via devel wrote: > > > But there is another pair of keys: C2S and S2C. They are used to > > authenticate and encrypt traffic between client and server. There is > > no explicit mec

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo James! On Sat, 2 Feb 2019 13:04:25 -0800 James Browning via devel wrote: > > > But if no packets are lost, C2S and S2C will be used forever. > > > > Yeah, bad. > > > What you almost need is a cookie extension to trigger a rekeying > periodically. Yes. Sad the Proposed RFC is silent on

Re: ntp.conf changes for NTS

2019-02-02 Thread Gary E. Miller via devel
Yo Hal! On Sat, 02 Feb 2019 12:36:10 -0800 Hal Murray via devel wrote: > But there is another pair of keys: C2S and S2C. They are used to > authenticate and encrypt traffic between client and server. There is > no explicit mechanism to roll them over - nor is there a need for one. Really? So

Re: ntp.conf changes for NTS

2019-02-02 Thread Hal Murray via devel
James Browning said: > IIRC the previous key is kept for a rotation. Unless you are using something > like poll 14+ it shouldn't be a problem. Correct. That's for K, the key the server uses to encrypt/decrypt part of a cookie. The client doesn't know anything about that key. But there is an

Re: ntp.conf changes for NTS

2019-02-02 Thread James Browning via devel
On Sat, Feb 2, 2019, 5:27 AM Hal Murray via devel > > Yes, you'd need implausible to impossible lifetimes of the client/server > > pairing for these to ever become a problem. But again, when key rollover > > gets implemented as indicated in the RFC, those will stop being useful > on the > > secon

Re: ntp.conf changes for NTS

2019-02-02 Thread Hal Murray via devel
> Yes, you'd need implausible to impossible lifetimes of the client/server > pairing for these to ever become a problem. But again, when key rollover > gets implemented as indicated in the RFC, those will stop being useful on the > second rollover. What stops being useful when K rolls over is o

Re: ntp.conf changes for NTS

2019-02-02 Thread Achim Gratz via devel
Hal Murray via devel writes: >> Sorry, this is plain nonsense. You will not create enough messages for this >> to ever be a problem even on a terabit link. And the RFC already asks you to >> do a key rollover on a ~day timescale, so you have even less chance to >> produce so many messages. > > D

Re: ntp.conf changes for NTS

2019-02-02 Thread Hal Murray via devel
> Sorry, this is plain nonsense. You will not create enough messages for this > to ever be a problem even on a terabit link. And the RFC already asks you to > do a key rollover on a ~day timescale, so you have even less chance to > produce so many messages. Different keys. The rollover cover

Re: ntp.conf changes for NTS

2019-02-02 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> I think there is a reasonable parallel between get another server via >> DNS and get another server via NTS-KE. > > Yes, except the protocol, as defined in the Proposed RFC, does not support it. Again, it supports it exactly the same way as the pool is currently

Re: ntp.conf changes for NTS

2019-02-02 Thread Achim Gratz via devel
Richard Laager via devel writes: > I agree that would be required to pin it. I wasn't asking to pin it by > default, just if ntpd should (as a client) always send a Server > Negotiation record. Given it's not required by the draft, it sounds like > you and Gary are leaning toward "no". For the rec

Re: ntp.conf changes for NTS

2019-02-01 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> Optionally, yes. I think this part of the RFC is poorly thought out, >> I'd prefer if the NTS-KE just straight failed if the server you >> specified is not available. > > I'm not sure why it has to be in the NTS-KE server. The client is free > to accept or reje

Re: ntp.conf changes for NTS

2019-02-01 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> Both keys should only ever be used by a single client/server pair. > > Yeah, but no way to enforce that. A black-, white-, or gray-hat could > easily reuse the same keys on thousands of servers at the same time. There is a virtual guarantee of unique keys if ea

Re: ntp.conf changes for NTS

2019-02-01 Thread Gary E. Miller via devel
Yo Eric! On Fri, 1 Feb 2019 17:03:02 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > Uh, sorry, too many threads. What was the context? > > https://lists.ntpsec.org/pipermail/devel/2019-February/007335.html Added to nts.adoc, RGDS GARY --

Re: ntp.conf changes for NTS

2019-02-01 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Uh, sorry, too many threads. What was the context? https://lists.ntpsec.org/pipermail/devel/2019-February/007335.html -- http://www.catb.org/~esr/";>Eric S. Raymond My work is funded by the Internet Civil Engineering Institute: https://icei.org Pleas

Re: ntp.conf changes for NTS

2019-02-01 Thread Gary E. Miller via devel
Yo Eric! On Fri, 1 Feb 2019 15:33:53 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > This prolly needs to be brought up to the WG. > > Please add it to the open issues section in nts.adoc. Uh, sorry, too many threads. What was the context? RGDS GARY

Re: ntp.conf changes for NTS

2019-02-01 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > This prolly needs to be brought up to the WG. Please add it to the open issues section in nts.adoc. -- http://www.catb.org/~esr/";>Eric S. Raymond My work is funded by the Internet Civil Engineering Institute: https://icei.org Please visit their site

Re: ntp.conf changes for NTS

2019-02-01 Thread Gary E. Miller via devel
Yo Hal! On Fri, 01 Feb 2019 11:11:14 -0800 Hal Murray via devel wrote: > Gary said: > > But then how do I say I want 2 from this pool and 2 from that > > pool? > > With the current code, you can't. > > I don't think we should tangle that discussion with NTS. Too late. How to make the pool

Re: ntp.conf changes for NTS

2019-02-01 Thread Hal Murray via devel
Gary said: > But then how do I say I want 2 from this pool and 2 from that pool? With the current code, you can't. I don't think we should tangle that discussion with NTS. >> If you need more, it does another DNS lookup. > And, of course, that DNS thing is problematic with NTS... I think ther

Re: ntp.conf changes for NTS

2019-02-01 Thread Gary E. Miller via devel
Yo Hal! On Fri, 01 Feb 2019 10:23:26 -0800 Hal Murray via devel wrote: > Gary said: > > Maybe expanded to ask for 3 pool servers: > > nts nts-ke.example.com pool 3 > > The current pool code doesn't work that way. Maybe it should, but it > doesn't. There is no way to specify how many servers

Re: ntp.conf changes for NTS

2019-02-01 Thread Hal Murray via devel
Gary said: > Maybe expanded to ask for 3 pool servers: > nts nts-ke.example.com pool 3 The current pool code doesn't work that way. Maybe it should, but it doesn't. There is no way to specify how many servers you get. There is a global variable specifying how many servers to get, Individual

Re: ntp.conf changes for NTS

2019-01-31 Thread Hal Murray via devel
Eric said: > If there's another revision in process, I want to object to the binary > request format. Raises endianness issues for no good reason. Better to use > something like Motorola S-records for this. I don't see how hex encoding helps anything. You still have the problem of are integ

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Eric! On Thu, 31 Jan 2019 17:26:31 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > I think the current proposal works: > > > > nts nts-ke.example.com > > nts nts-ke.example.com ask ntp.example.com > > nts nts-ke.example.com require ntp.example.com > > > > Maybe expanded to a

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Richard! On Thu, 31 Jan 2019 16:45:01 -0600 Richard Laager via devel wrote: > On 1/31/19 12:46 PM, Achim Gratz via devel wrote: > > Richard Laager via devel writes: > >> Here's another wrinkle. Does the first example, "nts > >> nts-ke.example.org", send a request for "nts-ke.example.org"? I

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Hal! On Thu, 31 Jan 2019 14:47:47 -0800 Hal Murray via devel wrote: > > No, re-keyed -- you specifically want to avoid the TLS > > renegotiation or even worse, reconnection. The session itself > > stays open. You could conceivably just open another connection > > inside the same session as

Re: ntp.conf changes for NTS

2019-01-31 Thread Hal Murray via devel
> No, re-keyed -- you specifically want to avoid the TLS renegotiation or even > worse, reconnection. The session itself stays open. You could conceivably > just open another connection inside the same session as far as TLS is > concerned. I don't know which of the two options is more efficien

Re: ntp.conf changes for NTS

2019-01-31 Thread Richard Laager via devel
On 1/31/19 12:46 PM, Achim Gratz via devel wrote: > Richard Laager via devel writes: >> Here's another wrinkle. Does the first example, "nts >> nts-ke.example.org", send a request for "nts-ke.example.org"? I think it >> should. > > The RFC doesn't have an explicit preference, but it's implied that

Re: ntp.conf changes for NTS

2019-01-31 Thread Richard Laager via devel
On 1/31/19 3:53 PM, Gary E. Miller via devel wrote: > I think the current proposal works: > > nts nts-ke.example.com > nts nts-ke.example.com ask ntp.example.com > nts nts-ke.example.com require ntp.example.com > > Maybe expanded to ask for 3 pool servers: > > nts nts-ke.example.com pool 3 I li

Re: ntp.conf changes for NTS

2019-01-31 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > I think the current proposal works: > > nts nts-ke.example.com > nts nts-ke.example.com ask ntp.example.com > nts nts-ke.example.com require ntp.example.com > > Maybe expanded to ask for 3 pool servers: > > nts nts-ke.example.com pool 3 Write this up in more detauil

Re: ntp.conf changes for NTS

2019-01-31 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Eric S. Raymond via devel writes: > > Still not textual. > > I'm not sure why you'd insist on textual representations, but ASCII-Hex > is something I'd frown upon. S-Records in particular is something that > was useful for ROM dumps, but not wire-protocols. Eyeball-frie

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Achim! On Thu, 31 Jan 2019 19:33:49 +0100 Achim Gratz via devel wrote: > Gary E. Miller via devel writes: > >> The same as if you never get an answer from any other random server > >> you tried to contact for whatever reason through a proxy. > > > > But it DOES give you an answer back. >

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Achim! On Thu, 31 Jan 2019 22:19:14 +0100 Achim Gratz via devel wrote: > Gary E. Miller via devel writes: > > The C2S and S2C already get reused millions of times, what's a few > > more million? > > Both keys should only ever be used by a single client/server pair. Yeah, but no way to enf

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Eric S. Raymond via devel writes: > Still not textual. I'm not sure why you'd insist on textual representations, but ASCII-Hex is something I'd frown upon. S-Records in particular is something that was useful for ROM dumps, but not wire-protocols. Regards, Achim. -- +<[Q+ Matrix-12 WAVE#46+305

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Gary E. Miller via devel writes: > The C2S and S2C already get reused millions of times, what's a few more > million? Both keys should only ever be used by a single client/server pair. These are symmetric keys, so whoever knows them can encrypt and decrypt all messages that use them. So sharing t

Re: ntp.conf changes for NTS

2019-01-31 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > We prolly need to start a doc somewhere for what we want answered. Start a new section in nts.adoc, please. In fact, I'll do it now. Done. Achim, you were complaining about underspecification. Please describe your issues in this succession. We'll have someone at th

Re: ntp.conf changes for NTS

2019-01-31 Thread Eric S. Raymond via devel
Achim Gratz via devel : > Eric S. Raymond via devel writes: > > Gary E. Miller via devel : > >> Next virtual meeting of the NTP WG is Feb 12. Maybe we should get some > >> of these issues on their agenda? > > > > If there's another revision in process, I want to object to the binary > > request fo

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Achim! On Thu, 31 Jan 2019 21:16:25 +0100 Achim Gratz via devel wrote: > Gary E. Miller via devel writes: > >> I think you'd > >> need to reconnect to the NTS-KE, but at least need to re-key the > >> TLS session > > > > Why? To get new C2S and S2C? > > Yes. The C2S and S2C already get

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Eric! On Thu, 31 Jan 2019 15:18:56 -0500 "Eric S. Raymond" wrote: > Gary E. Miller via devel : > > Next virtual meeting of the NTP WG is Feb 12. Maybe we should get > > some of these issues on their agenda? > > If there's another revision in process, Dunno about that. All we can do is

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Eric S. Raymond via devel writes: > Gary E. Miller via devel : >> Next virtual meeting of the NTP WG is Feb 12. Maybe we should get some >> of these issues on their agenda? > > If there's another revision in process, I want to object to the binary > request format. Raises endianness issues for no

Re: ntp.conf changes for NTS

2019-01-31 Thread Eric S. Raymond via devel
Gary E. Miller via devel : > Next virtual meeting of the NTP WG is Feb 12. Maybe we should get some > of these issues on their agenda? If there's another revision in process, I want to object to the binary request format. Raises endianness issues for no good reason. Better to use something like

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> I think you'd >> need to reconnect to the NTS-KE, but at least need to re-key the TLS >> session > > Why? To get new C2S and S2C? Yes. >> before asking for the next server in that scenario. > > Which is the big issue. How does an NTPD client connect to an NTS

Re: ntp.conf changes for NTS

2019-01-31 Thread Gary E. Miller via devel
Yo Achim! On Thu, 31 Jan 2019 20:02:27 +0100 Achim Gratz via devel wrote: > The RFC is underspecified w.r.t. pools in my opinion, Yup. > I think you'd > need to reconnect to the NTS-KE, but at least need to re-key the TLS > session Why? To get new C2S and S2C? > before asking for the next s

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Richard Laager via devel writes: > On 1/30/19 2:32 PM, Achim Gratz via devel wrote: >> Again, leave server for plain NTP and use a new keyword. > > Perhaps you already did and I missed it, but can you explain why we need > a new top-level keyword rather than an option? That creates an easily recog

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Richard Laager via devel writes: > The client sending a Server Negotiation record is functionally very > similar to SNI, where a TLS client tells the TLS server the hostname it > is using: https://en.wikipedia.org/wiki/Server_Name_Indication > > This is used with HTTPS to implement virtual hosting-

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Richard Laager via devel writes: > On 1/30/19 2:37 PM, Gary E. Miller via devel wrote: >> Sure there is, we now have a choice that did not formerly exist, and I >> can see uses for both: >> >> 1. If we do not get desired server: fail >> 2. If we do not get desired server: use the offered one inste

Re: ntp.conf changes for NTS

2019-01-31 Thread Achim Gratz via devel
Gary E. Miller via devel writes: >> The same as if you never get an answer from any other random server >> you tried to contact for whatever reason through a proxy. > > But it DOES give you an answer back. Optionally, yes. I think this part of the RFC is poorly thought out, I'd prefer if the NTS-

Re: ntp.conf changes for NTS

2019-01-30 Thread Richard Laager via devel
On 1/30/19 5:14 PM, Gary E. Miller via devel wrote: > On Wed, 30 Jan 2019 16:59:28 -0600 > Richard Laager via devel wrote: > >> There's another complication too. The server can send back a name or >> an IP address. What happens if the client request contains a name and >> the server's response co

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Richard! On Wed, 30 Jan 2019 16:59:28 -0600 Richard Laager via devel wrote: > There's another complication too. The server can send back a name or > an IP address. What happens if the client request contains a name and > the server's response contains an IP? That might be a match (e.g. if > t

Re: ntp.conf changes for NTS

2019-01-30 Thread Richard Laager via devel
On 1/30/19 2:37 PM, Gary E. Miller via devel wrote: > Sure there is, we now have a choice that did not formerly exist, and I > can see uses for both: > > 1. If we do not get desired server: fail > 2. If we do not get desired server: use the offered one instead > > #2 is new to NTS. > > For an un

Re: ntp.conf changes for NTS

2019-01-30 Thread Richard Laager via devel
On 1/30/19 2:32 PM, Achim Gratz via devel wrote: > Again, leave server for plain NTP and use a new keyword. Perhaps you already did and I missed it, but can you explain why we need a new top-level keyword rather than an option? What is your config proposal for handling pools? Note that the fundam

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Richard! On Wed, 30 Jan 2019 15:25:47 -0600 Richard Laager via devel wrote: > On 1/30/19 1:41 PM, Gary E. Miller via devel wrote: > > On Wed, 30 Jan 2019 01:19:08 -0600 > > Richard Laager via devel wrote: > > > >> So in this example, you have ntp.example.com as the NTS-KE server, > >> and

Re: ntp.conf changes for NTS

2019-01-30 Thread Richard Laager via devel
On 1/30/19 1:41 PM, Gary E. Miller via devel wrote: > On Wed, 30 Jan 2019 01:19:08 -0600 > Richard Laager via devel wrote: > >> So in this example, you have ntp.example.com as the NTS-KE server, and >> 1.2.3.4 or bob.example.com as the NTP servers? I assume it has to be >> that way, as TLS doesn'

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Achim! On Wed, 30 Jan 2019 21:32:57 +0100 Achim Gratz via devel wrote: > Gary E. Miller via devel writes: > > I can see value in this for testing, but IMHO it should be > > discouraged for general use. I'd like the new ntp.conf syntax to > > somehow emphasize that this is discouraged and opt

Re: ntp.conf changes for NTS

2019-01-30 Thread Achim Gratz via devel
Gary E. Miller via devel writes: > I can see value in this for testing, but IMHO it should be discouraged > for general use. I'd like the new ntp.conf syntax to somehow emphasize > that this is discouraged and optional. No. There are several institutions that have multiple servers of which the u

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Achim! On Wed, 30 Jan 2019 20:44:31 +0100 Achim Gratz via devel wrote: > Hal Murray via devel writes: > >> I'd suggest using a new keyword for that and leaving the existing > >> ones behijnd for NTP w/o encryption. > > > > Then we'll need 2 new keywords. We want NTS to work on pool sites >

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Richard! On Wed, 30 Jan 2019 01:18:38 -0600 Richard Laager via devel wrote: > On 1/29/19 6:11 PM, Gary E. Miller via devel wrote: > > Which conflicts with the Proposed RFC which says the NTS-KE tells us > > which NTPD server, not the config file. > > The draft supports a mechanism wherein

Re: ntp.conf changes for NTS

2019-01-30 Thread Achim Gratz via devel
Hal Murray via devel writes: >> I'd suggest using a new keyword for that and leaving the existing ones >> behijnd for NTP w/o encryption. > > Then we'll need 2 new keywords. We want NTS to work on pool sites too. No, the client doesn't need to do anything special for pool servers anymore, since t

Re: ntp.conf changes for NTS

2019-01-30 Thread Gary E. Miller via devel
Yo Richard! On Wed, 30 Jan 2019 01:19:08 -0600 Richard Laager via devel wrote: > So in this example, you have ntp.example.com as the NTS-KE server, and > 1.2.3.4 or bob.example.com as the NTP servers? I assume it has to be > that way, as TLS doesn't work _in practice_ (yes, I know it is > suppor

Re: ntp.conf changes for NTS

2019-01-29 Thread Richard Laager via devel
On 1/29/19 6:11 PM, Gary E. Miller via devel wrote: > Which conflicts with the Proposed RFC which says the NTS-KE tells us > which NTPD server, not the config file. The draft supports a mechanism wherein the client can request an NTP server from the NTS-KE server. -- Richard signature.asc Des

Re: ntp.conf changes for NTS

2019-01-29 Thread Richard Laager via devel
On 1/29/19 4:38 AM, Hal Murray via devel wrote: > How should we tell the system we want to use NTS when talking to a server? > > The catch is that we potentially need two names/addresses. > > I think the simple case is just: > server ntp.example.com nts > That will do a NTS-KE exchange with the

Re: ntp.conf changes for NTS

2019-01-29 Thread Gary E. Miller via devel
Yo Hal! On Tue, 29 Jan 2019 16:05:41 -0800 Hal Murray via devel wrote: > Gary said: > >> How about: > >>server ntp.example.com nts 1.2.3.4 > >> or > >>server ntp.example.com nts bob.example.com > > > Why do we need ntp.example.com at all? Aren't we supposed to use > > the NTPD server

Re: ntp.conf changes for NTS

2019-01-29 Thread Hal Murray via devel
Gary said: >> How about: >>server ntp.example.com nts 1.2.3.4 >> or >>server ntp.example.com nts bob.example.com > Why do we need ntp.example.com at all? Aren't we supposed to use the NTPD > server returned from bob.example.com? The intent was to do the NTS-KE dance with ntp.example.c

Re: ntp.conf changes for NTS

2019-01-29 Thread Gary E. Miller via devel
Yo James! On Tue, 29 Jan 2019 15:23:04 -0800 James Browning via devel wrote: > On 1/29/19, Gary E. Miller via devel wrote: > > Yo Hal! > > > > On Tue, 29 Jan 2019 02:38:26 -0800 > > Hal Murray via devel wrote: > > > >> The complicated case is when we want to specify the IP Address. > >> How

Re: ntp.conf changes for NTS

2019-01-29 Thread James Browning via devel
On 1/29/19, Gary E. Miller via devel wrote: > Yo Hal! > > On Tue, 29 Jan 2019 02:38:26 -0800 > Hal Murray via devel wrote: > >> The complicated case is when we want to specify the IP Address. How >> about: server ntp.example.com nts 1.2.3.4 >> or >> server ntp.example.com nts bob.example.com >

Re: ntp.conf changes for NTS

2019-01-29 Thread Gary E. Miller via devel
Yo Hal! On Tue, 29 Jan 2019 02:38:26 -0800 Hal Murray via devel wrote: > The complicated case is when we want to specify the IP Address. How > about: server ntp.example.com nts 1.2.3.4 > or > server ntp.example.com nts bob.example.com Why do we need ntp.example.com at all? Aren't we suppose

Re: ntp.conf changes for NTS

2019-01-29 Thread Hal Murray via devel
> I'd suggest using a new keyword for that and leaving the existing ones > behijnd for NTP w/o encryption. Then we'll need 2 new keywords. We want NTS to work on pool sites too. -- These are my opinions. I hate spam. ___ devel mailing list dev

Re: ntp.conf changes for NTS

2019-01-29 Thread Achim Gratz via devel
Hal Murray via devel writes: > How should we tell the system we want to use NTS when talking to a server? > > The catch is that we potentially need two names/addresses. I'd suggest using a new keyword for that and leaving the existing ones behijnd for NTP w/o encryption. In general you need to sp

Re: ntp.conf changes for NTS

2019-01-29 Thread Eric S. Raymond via devel
Hal Murray via devel : > > How should we tell the system we want to use NTS when talking to a server? > > The catch is that we potentially need two names/addresses. > > I think the simple case is just: > server ntp.example.com nts > That will do a NTS-KE exchange with the system at ntp.example

ntp.conf changes for NTS

2019-01-29 Thread Hal Murray via devel
How should we tell the system we want to use NTS when talking to a server? The catch is that we potentially need two names/addresses. I think the simple case is just: server ntp.example.com nts That will do a NTS-KE exchange with the system at ntp.example.com and use the IP Address it return