On 1/18/19 4:44 PM, Gary E. Miller via devel wrote: > Maybe we want to derive C2S and S2C from the TLS session, but I do not > see that as mandated.
Am I reading the right draft: https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-15#section-5.1 If so, it is definitely mandated by "SHALL": 5.1. Key Extraction (for NTPv4) Following a successful run of the NTS-KE protocol wherein Protocol ID 0 (NTPv4) is selected as a Next Protocol, two AEAD keys SHALL be extracted: a client-to-server (C2S) key and a server-to-client (S2C) key. These keys SHALL be computed according to RFC 5705 [RFC5705], using the following inputs. -- Richard
signature.asc
Description: OpenPGP digital signature
_______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel