Yo Hal!

On Mon, 14 Jan 2019 12:45:58 -0800
Hal Murray via devel <devel@ntpsec.org> wrote:

> > It is actually allowed to re-use cookies, specifically if it wants
> > to avoid that re-keying.  Whether that's a good idea is debatable,
> > but the server doesn't know either way and the decision is up to
> > the client.   
> 
> Right.
> 
> I think we should make a "no reuse" decision.

The Proposed RFC says reuse is OK until the NTPD returns a NACK.

> We want that option
> for no-tracking.

Maybe an option for the client, the NTPD does not care if it is tracked.

>  We can't just keep reusing the first cookie we get
> since the master key will get updated occasionally.

Sure we can.  Nothing in the Proposed RFC says the NTPD must invalidate
cookies.  As a practical matter maybe the NTPD needs a config option
for cookie lifetime.


> Next time somebody is editing, please add a no-reuse note at the
> bottom.

I'm all for a note, but we disagree on what it should say.

> > BTW, the number eight is not arbitrary: that is exactly the number
> > of packets a burst poll would use.   
> 
> The normal case is that the client gets back a response before it
> sends the next request in the burst, so it only needs 1 cookie to
> start with.

And it could use the same cookie 8 (n) times.

RGDS
GARY
---------------------------------------------------------------------------
Gary E. Miller Rellim 109 NW Wilmington Ave., Suite E, Bend, OR 97703
        g...@rellim.com  Tel:+1 541 382 8588

            Veritas liberabit vos. -- Quid est veritas?
    "If you can’t measure it, you can’t improve it." - Lord Kelvin

Attachment: pgp_ymV6KExL4.pgp
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to