Re: NTS dropping TLS 1.2

2020-03-24 Thread Hal Murray via devel
> I think that our implementing this is a good reason for make a point release. Sounds good. I'll have code ready in a day or 3. What else should we be working on or testing? (I need to update the doc on rate limiting.) -- These are my opinions. I hate spam.

Re: NTS dropping TLS 1.2

2020-03-23 Thread Mark Atwood via devel
I think that our implementing this is a good reason for make a point release. ..ѥѸђ Mark Atwood Project Manager of the NTPsec Project +1-206-604-2198 On Mon, Mar 23, 2020, at 01:24, Hal Murray wrote: > > A new version of the draft RFC is available: >

Re: NTS dropping TLS 1.2

2020-03-23 Thread Richard Laager via devel
On 3/23/20 5:43 AM, Eric S. Raymond via devel wrote: > Hal Murray : >> We can do several things: >> 1) clean out the ifdefs that make things work with older versions of >> OpenSSL. >> That is drop support for systems that haven't upgraded their OpenSSL to >> a >> supported version. >>

Re: NTS dropping TLS 1.2

2020-03-23 Thread Eric S. Raymond via devel
Hal Murray : > We can do several things: > 1) clean out the ifdefs that make things work with older versions of > OpenSSL. > That is drop support for systems that haven't upgraded their OpenSSL to a > supported version. > 2) leave things alone, ignore the RFC. > Or maybe add some

NTS dropping TLS 1.2

2020-03-23 Thread Hal Murray via devel
A new version of the draft RFC is available: https://datatracker.ietf.org/doc/draft-ietf-ntp-using-nts-for-ntp/ They decided to drop support for TLS 1.2. Details way down. They also tweaked the TLS export string used to make client-server keys. That will break things if the client and