Re: Getting ready for a release, wildcards

2022-04-20 Thread Matt Selsky via devel
Hi Hal,

I don't think we should have a knob for disabling wildcards. This is not the 
sort of knob that operators expect (what other software provides such a knob?) 
and we're just adding another code path to test.

Are there any other release blockers?  If not, I'll update the NEWS for the 
user-facing/high impact changes and cut a release candidate.

Thanks,
-Matt

___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Re: Release, wildcards, etc

2022-04-20 Thread Matt Selsky via devel
Hi Hal,

I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged 
and then do the release.

Is there anything else that we want in the release?

Thanks,
-Matt

___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Getting ready for a release, wildcards

2022-04-20 Thread Hal Murray via devel


I just pushed 2 tweaks.  One is to update the nts cert documentation to say 
that it doesn't do any checking on the certificate.

The other is a hack patch to aes_siv.c to supress deprecated warnings from 
OpenSSL 3.

Is anybody (else) using OpenSSL 3?

It's trivial on FreeBSD.  Just install openssl-devel-3.0.2
(3.0.3 will be out soon)

For others, HOWTO-OpenSSL should be enough.
If not, please fix it, or tell me where you got it trouble or ...

--

I think I understand the wildcard tangle.  They are generally considered OK.

My plan is to fixup the code so that the default is to accept wildcards but 
it's easy to turn them off.  Details TBD.

Can anybody think of any other optional features that would make things 
slightly more secure?

We should start collecting ideas in this area.


-- 
These are my opinions.  I hate spam.



___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel


Release, wildcards, etc

2022-04-20 Thread Hal Murray via devel


> Sigh. I should get up to speed onmn crypto and certificates.  I doubt I can
> do it fast enough to be useful on this one, though. 

Service Names in TLS
  https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/
It's 24 pages with the usual amount of boiler plate so only half of that is 
serious reading.



To get in the right mind set, you should watch a few of Moxie Marlinspike's 
talks.
He's a good speaker.

DEF CON 17 - Moxie Marlinspike - More Tricks for Defeating SSL
  https://www.youtube.com/watch?v=5dhSN9aEljg
48 minutes -- hacking SSL

DEF CON 18 - Moxie Marlinspike - Changing Threats To Privacy: From TIA to 
Google
  https://www.youtube.com/watch?v=DoeNbZlxfUM
43 minutes -- Privacy

DEF CON 19 - Moxie Marlinspike - SSL And The Future Of Authenticity
  https://www.youtube.com/watch?v=UawS3_iuHoA
46 minutes -- trusting CAs


-- 
These are my opinions.  I hate spam.



___
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel