As part of the IETF Network Time Security (NTS) effort, it would be helpful
to understand the importance of NTP's symmetric peering mode.  Can folks on
this list please share their experience with NTP's symmetric mode?

Do you use it, and if so why (or why not), and if so in what operational
environment are you using it?

Active/active or active/passive?  Crypto authentication or not?

Thank you,
Sharon (For NTS design team)

-- 
Sharon Goldberg
Computer Science, Boston University
http://www.cs.bu.edu/~goldbe
_______________________________________________
time-nuts mailing list -- time-nuts@febo.com
To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts
and follow the instructions there.

Reply via email to