On Mi, Nov 27, 2019 at 09:06:58 -0600, Richard Laager wrote:
Use of ntp.keys is a scenario that doesn't get discussed much. README.Debian says: ntpkeygen can be used to generate an MD5 ntp.keys file in /etc. Use of these keys has not yet been tested; please report success or failure in using them to the maintainer." I believe that text, or at least the spirit, is inherited from the ntp package, and both upstreams are curious to hear from users of this too.
I’m using ntp.keys for years. They are working for most appliances as well (Cisco, HPE, Fortinet).
Are you using this between your own server and clients, or between your server and external servers? Do you anticipate NTS replacing your use of ntp.keys? (If not, why?)
I don’t know any external servers with keys, so I’m using them only in my own network. I don’t think that NTS will replace ntp.keys until appliances are supporting NTS. And it will take time even between linux servers because the new ntpsec version must be available. SLES 12 doesn’t even have a package ntpsec, only ntp. So if ntp doesn’t get NTS support, you may never be able to replace ntp.keys with NTS.
So I think that ntp.keys will stay for years.
Agreed! ntp.conf has an example of the bits that belong there. The apparmor bit is covered in README.Debian: When configuring ntpd as an NTS server, if your certificate and key files are not already covered by /etc/apparmor.d/abstractions/ssl_certs and ssl_keys, you will need to add rules to /etc/apparmor.d/local/usr.sbin.ntpd to allow reading them. If you have suggested changes to that, please let me know.
No, this sounds fine. Shade and sweet water! Stephan -- | If your life was a horse, you'd have to shoot it. |