Network Time Protocol: Secure Network Time
draft-stenn-ntp-secure-network-time-00

Document Type Expired Internet-Draft (individual)
Last updated 2019-01-03 (latest revision 2018-07-02)
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-stenn-ntp-secure-network-time-00.txt

Abstract

The proposal specifies a means for NTP instances that can establish a TCP connection between themselves to create secure ephemeral keys. With the known weaknesses of the public-key security protocol, Autokey, which is defined by RFC 5906 [RFC5906], a replacement for Autokey that supports at least Client/Server and Symmetric modes must be provided.

Authors

Harlan Stenn (stenn@nwtime.org)
David Mills (mills@udel.edu)
Philip Prindeville (prindeville@ntp.org)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)