On Fri, Oct 14, 2011 at 7:19 PM, David L. Mills <[email protected]> wrote: > Nico and Danny, > > It might help to explain the issues in the NTP white papers at the NTP > project page www.eecis.udel.edu./ntp.html. Chapter 16 in the book shows the > results of experiments using interleaved mode, which might be of interest in > PTP broadcast issues. The paper on Simulation and Analysis of the NTP > On-Wire protocol uses a two-step process similar to PTP. The paper on NTP > Security Analysis may have lessons for PTP authentication. The NTP Autokey > model needs help, as suggested in that paper.
Also helpful was to note the cc list and then look at the TICTOC WG charter. If I understand the I-D we're talking about a an extension to IPsec to minimize overhead in handling of packets carrying time data, particularly in an SG environment. This would allow NTP to be run with no crypto inside the security boundary, with IPsec providing security outside. Is this correct? And this performs better than the interleaved NTP scheme with asymmetric key signatures? Nico -- _______________________________________________ IPsec mailing list [email protected] https://www.ietf.org/mailman/listinfo/ipsec
