In message <[EMAIL PROTECTED]>, Mark Murray writes:
>> People have tried for 30+ years to predict what a quartz xtal
>> will do next.  Nobody expects any chance of success.  Add to this
>> the need to predict the difference between one or more NTP servers
>> and your local qartz xtal and I think we can safely say "impossible".
>You can't predict this, but you can _measure_ it with a degree of
>accuracy. The attacker can use this accuracy to reduce the number
>of tries in his attack.

No he cannot.  The NTP poll period is 64 seconds or longer and unless
you have done something special about your hardware, he cannot predict
all bits.

If he could, ntp would have a longer poll period :-)

Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
[EMAIL PROTECTED]         | TCP/IP since RFC 956
FreeBSD coreteam member | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.

To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-current" in the body of the message

Reply via email to