[chrony-dev] [GIT] chrony/chrony.git branch master updated. 4.3-15-g5a39074 |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-dev Archives
]
This is an automated email from git. It was generated because a ref
change was pushed to the "chrony/chrony.git" repository.
The branch, master has been updated
via 5a39074e01a654570d3b581ae5feda9f010fd8f2 (commit)
via c8e57f43503c52d3b250490db64cde4e500099aa (commit)
via b1230efac33314fe68ad8d37837919ff6f756e7d (commit)
via 4e1ce8898168626d4bb54e1ac3013dc3eb6b0ee0 (commit)
via 790a336eb21b4bf7e321eb6ce6342fa26110c347 (commit)
via cc706b50b9f84715eba80ee99bbe3a166dad01c7 (commit)
via 73042494bd4864f4379a5454a22c33a52a1f68f5 (commit)
via ec89739d50226a2959e7635e5c3df01e703e6869 (commit)
via 4baf999cc30b992f5cf7de7dcb5ec08ac5e61af6 (commit)
via 9afd19c29b3d8097a0a1b3df20e0bd1b1e0a6991 (commit)
via 5dd173c05014fc0b31bb4f407ac20bea2b0dc8cf (commit)
via 5caf0ad1877170bf4773c5757ccbef9fd97b5c81 (commit)
via 17d2291a84b56904e473ae7ae0ff29831059abfb (commit)
via a6179261a7f2de08f9e0bd9ac2110cbe52a4fbf4 (commit)
via 098e0c43fc395b33b92bf220478f4c4241253121 (commit)
from 7b197953e8add5515b7e58c4638dc55aa4bb91b7 (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
- Log -----------------------------------------------------------------
commit 5a39074e01a654570d3b581ae5feda9f010fd8f2
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Wed Oct 19 14:57:16 2022 +0200
nts: fix number of extension fields after failed encryption
If the authenticator SIV encryption fails (e.g. due to wrong nonce
length), decrement the number of extension fields to keep the packet
info consistent.
commit c8e57f43503c52d3b250490db64cde4e500099aa
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Thu Oct 13 15:35:53 2022 +0200
nts: change ntskeys format to support different algorithms
Specify the AEAD ID for each key saved in the ntskeys file instead of
one ID for all keys. Keep support for loading files in the old format.
This will allow servers to save their keys after upgrading to a new
version with AES-128-GCM-SIV support before the loaded AES-SIV-CMAC-256
keys are rotated out.
If an unsupported key is found, don't load any keys. Also, change the
severity of the error message from debug to error.
commit b1230efac33314fe68ad8d37837919ff6f756e7d
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Wed Oct 12 16:46:56 2022 +0200
nts: add support for encrypting cookies with AES-128-GCM-SIV
If AES-128-GCM-SIV is available on the server, use it for encryption of
cookies. This makes them shorter by 4 bytes due to shorter nonce and it
might also improve the server performance.
After server upgrade and restart with ntsdumpdir, the switch will happen
on the second rotation of the server key. Clients should accept shorter
cookies without restarting NTS-KE. The first response will have extra
padding in the authenticator field to make the length symmetric.
commit 4e1ce8898168626d4bb54e1ac3013dc3eb6b0ee0
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Wed Oct 12 16:00:45 2022 +0200
nts: make server key access more readable
Get a pointer to the server key instead of repeated indexing.
commit 790a336eb21b4bf7e321eb6ce6342fa26110c347
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Tue Oct 11 14:36:14 2022 +0200
nts: add server support for authentication with AES-128-GCM-SIV
Keep a server SIV instance for each available algorithm.
Select AES-128-GCM-SIV if requested by NTS-KE client as the first
supported algorithm.
Instead of encoding the AEAD ID in the cookie, select the algorithm
according to the length of decrypted keys. (This can work as a long as
all supported algorithms use keys with different lengths.)
commit cc706b50b9f84715eba80ee99bbe3a166dad01c7
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Oct 10 16:35:20 2022 +0200
nts: add client support for authentication with AES-128-GCM-SIV
If AES-128-GCM-SIV is available on the client, add it to the requested
algorithms in NTS-KE as the first (preferred) entry.
If supported on the server, it will make the cookies shorter, which
will get the length of NTP messages containing only one cookie below
200 octets. This should make NTS more reliable in networks where longer
NTP packets are filtered as a mitigation against amplification attacks
exploiting the ntpd mode 6/7 protocol.
commit 73042494bd4864f4379a5454a22c33a52a1f68f5
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Oct 10 15:09:01 2022 +0200
nts: add support for NTP authenticator field using AES-GCM-SIV
Add support for SIV algorithms which have maximum nonce length shorter
than 16 bytes.
commit ec89739d50226a2959e7635e5c3df01e703e6869
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Tue Oct 11 12:32:04 2022 +0200
nts: make sure encrypted S2C and C2S keys have equal length
Don't allow a cookie to contain keys with different lengths to not break
the assumption made in decoding, if there will ever be a case where this
could be requested.
commit 4baf999cc30b992f5cf7de7dcb5ec08ac5e61af6
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Tue Oct 11 10:35:19 2022 +0200
nts: don't connect to server if missing AES-SIV-CMAC-256
Avoid wasting server resources if the client doesn't support
AES-SIV-CMAC-256 (the only algorithm required on servers).
commit 9afd19c29b3d8097a0a1b3df20e0bd1b1e0a6991
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Oct 10 12:43:40 2022 +0200
nts: use signed lengths in NNA_DecryptAuthEF()
Make the types consistent with the rest of the file.
commit 5dd173c05014fc0b31bb4f407ac20bea2b0dc8cf
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Oct 10 12:25:47 2022 +0200
siv: add functions to return min and max nonce length
While AES-SIV-CMAC allows nonces of any length, AES-GCM-SIV requires
exactly 12 bytes, which is less than the unpadded minimum length of 16
used in the NTS authenticator field. These functions will be needed to
support both ciphers in the NTS code.
commit 5caf0ad1877170bf4773c5757ccbef9fd97b5c81
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Mon Oct 3 17:28:39 2022 +0200
siv: add support for AES-128-GCM-SIV in Nettle
This is a newer nonce misuse-resistant cipher specified in RFC 8452,
which is now supported in the development code of the Nettle library.
The advantages over AES-SIV-CMAC-256 are shorter keys and better
performance.
commit 17d2291a84b56904e473ae7ae0ff29831059abfb
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Tue Oct 18 10:22:23 2022 +0200
doc: improve ntsrotate description
commit a6179261a7f2de08f9e0bd9ac2110cbe52a4fbf4
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Thu Oct 13 12:29:29 2022 +0200
doc: fix wrong name of authselectmode directive
commit 098e0c43fc395b33b92bf220478f4c4241253121
Author: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
Date: Tue Sep 20 10:56:28 2022 +0200
test: add float-cast-overflow to 003-sanitizers test
-----------------------------------------------------------------------
Summary of changes:
configure | 11 ++-
doc/chrony.conf.adoc | 5 +-
doc/chronyc.adoc | 5 +-
doc/faq.adoc | 2 +-
nts_ke_client.c | 31 +++++--
nts_ke_server.c | 197 ++++++++++++++++++++++++++--------------
nts_ntp_auth.c | 20 ++--
nts_ntp_auth.h | 2 +-
nts_ntp_server.c | 48 +++++++---
siv.h | 4 +
siv_gnutls.c | 16 ++++
siv_nettle.c | 141 +++++++++++++++++++++++-----
test/compilation/003-sanitizers | 2 +-
test/unit/nts_ke_client.c | 7 +-
test/unit/nts_ke_server.c | 3 +-
test/unit/nts_ntp_auth.c | 149 +++++++++++++++++-------------
test/unit/nts_ntp_client.c | 30 ++++--
test/unit/nts_ntp_server.c | 6 +-
test/unit/siv.c | 110 +++++++++++++++++++++-
19 files changed, 585 insertions(+), 204 deletions(-)
hooks/post-receive
--
chrony/chrony.git
--
To unsubscribe email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "unsubscribe" in the subject.
For help email chrony-dev-request@xxxxxxxxxxxxxxxxxxxx with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.