[email protected] said:
>    Maybe someone would be interested in following up on this and write up a
>    paragraph about how best to use/configure IPsec to secure NTP traffic
>    (and possibly some pros and cons about doing this, too). This text
>    might, for example, be added to the Security Considerations of the NTP
>    BCP document.
>    What do people think about this? 

I think a BCP style writeup of how to use IPSec with NTP would be a good 
idea.  I assume it gets complicated if you don't have a shared key.

I think an overview document comparing various approaches for authenticating 
NTP would be a good idea.




-- 
These are my opinions.  I hate spam.



_______________________________________________
TICTOC mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/tictoc

Reply via email to