Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <C281A17C31CFD745B242416D0E96EC6371806DA5@ONWVEXCHMB04.ciena.com>
Date: Mon, 20 Oct 2014 09:04:57 -0400
From: "Bendler, Ehren" <ebendler@...na.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: RE: attacking hsts through ntp

The symmetric schemes do work, but due to data structure sizing only MD5 and SHA-1 hashed PSKs are supported:
http://bugs.ntp.org/show_bug.cgi?id=2039

They imply in the comments that it will take a new version of the NTP RFCs to get support for stronger hashing schemes.


-----Original Message-----
From: Stephen Röttger [mailto:stephen.roettger@...il.com] 
Sent: Monday, October 20, 2014 5:17 AM
To: oss-security@...ts.openwall.com
Subject: Re: [oss-security] attacking hsts through ntp

>What about RFC 5906 and the current authentication schemes
> (http://www.eecis.udel.edu/~mills/ntp/html/authentic.html) ?

The protocol from RFC 5906 is completely broken:
  http://www.eecis.udel.edu/~mills/security.html
  http://zero-entropy.de/autokey_analysis.pdf

The symmetric schemes are probably fine but hard to set up. But it looks like the NIST provides authenticated NTP:
http://www.nist.gov/pml/div688/grp40/auth-ntp.cfm

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.