chrony/doc
Miroslav Lichvar 4a219ecbf1 hash: drop support for RIPEMD hash functions
An analysis by Tim Ruffing [1] shows that a length extension attack
adding valid extension fields to NTPv4 packets is possible with some
specific key lengths and hash functions using little-endian length like
MD5 and RIPEMD160.

chronyd currently doesn't process or generate any extension fields, but
it could be a problem in future when a non-authentication extension
field is supported.

Drop support for all RIPEMD functions as they don't seem to be secure in
the context of the NTPv4 MAC. MD5 is kept only for compatibility.

[1] https://mailarchive.ietf.org/arch/msg/ntp/gvibuB6bTbDRBumfHNdJ84Kq4kA
2019-09-24 11:32:31 +02:00
..
chrony.conf.adoc hash: drop support for RIPEMD hash functions 2019-09-24 11:32:31 +02:00
chronyc.adoc doc: improve description of LastRx column in chronyc sources 2018-08-27 11:26:51 +02:00
chronyd.adoc doc: improve chronyd man page 2019-07-04 17:38:13 +02:00
faq.adoc doc: improve ntpdate answer in FAQ 2019-08-06 16:11:07 +02:00
installation.adoc doc: list build requirements in installation 2019-04-30 12:56:25 +02:00
Makefile.in configure: rename SOCKDIR to RUNDIR 2016-12-02 14:53:03 +01:00