Development issues regarding the cerowrt test router project
 help / color / mirror / Atom feed
From: Aaron Wood <woody77@gmail.com>
To: Joseph Swick <cerowrt@decoy.cotse.net>
Cc: "cerowrt-devel@lists.bufferbloat.net"
	<cerowrt-devel@lists.bufferbloat.net>
Subject: Re: [Cerowrt-devel] DNSSEC & NTP Bootstrapping
Date: Sun, 23 Mar 2014 11:12:34 +0100	[thread overview]
Message-ID: <CALQXh-MsLsWeVT_3+XaFQy5d3OcpbkQcgMi0mROuO0J5JS0Q7Q@mail.gmail.com> (raw)
In-Reply-To: <MTAwMDAzOS5kZWNveQ.1395522917@quikprotect>

[-- Attachment #1: Type: text/plain, Size: 1178 bytes --]

>
> > The ntp servers queried presently largely are not dnssec signed, so
> > the ntp queries
> > should succeed (I think?) in the general case. However, for
> > robustness, I'd argue for enhancing the ntp startup script to
> > temporarily disable dnssec until it gets a valid time, and then
> > enabling it. I believe support for running the script was added to
> > busybox ntp, the problem  remaining is how to tell dnsmasq about it
> > correctly.
> >
>
> Ok, part of my issue was probably also that the clock was so far off, it
> didn't want to skew to the correct time.


Something I've done in the past on systems without RTCs is to have the ntp
init script loop on calling ntpdate until it gets a valid time, and then
switch over to the continuously running ntpd.  Everything that needs the
correct time then has to start after ntp.  But with DNSSEC, that's going to
push the need to have the ntp servers specified by ip address, not by
hostname, or to have them never be secure, or we find a way to have
long-lived dnssec entries.  I think raw IP address specification is
probably safer than trying to do something like creating an insecure window
around dnssec.

-Aaron

[-- Attachment #2: Type: text/html, Size: 1521 bytes --]

  reply	other threads:[~2014-03-23 10:12 UTC|newest]

Thread overview: 51+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-03-22  3:33 Joseph Swick
2014-03-22 17:42 ` Dave Taht
2014-03-22 18:43   ` Simon Kelley
2014-03-22 19:38     ` Toke Høiland-Jørgensen
2014-03-22 19:42       ` Simon Kelley
2014-03-22 20:00         ` Toke Høiland-Jørgensen
2014-03-24 21:39           ` Simon Kelley
2014-03-27 20:38           ` Simon Kelley
2014-03-28  7:57             ` Toke Høiland-Jørgensen
2014-03-28  9:08               ` Simon Kelley
2014-03-28  9:18                 ` Toke Høiland-Jørgensen
2014-03-28 10:41                   ` Simon Kelley
2014-03-28 10:48                     ` Toke Høiland-Jørgensen
2014-03-28 19:46                       ` Simon Kelley
2014-03-28 20:55                       ` Simon Kelley
2014-03-29  9:20                         ` Toke Høiland-Jørgensen
2014-03-29 10:55                           ` [Cerowrt-devel] DNSSEC & NTP Bootstrapping -- prototype! Toke Høiland-Jørgensen
2014-03-29 21:21                             ` Michael Richardson
2014-03-29 21:30                               ` Dave Taht
2014-03-30 13:21                                 ` Toke Høiland-Jørgensen
2014-03-30 16:59                                   ` Dave Taht
2014-03-30 18:38                                     ` Toke Høiland-Jørgensen
2014-03-30 19:30                                   ` Toke Høiland-Jørgensen
2014-03-30 20:06                                     ` Dave Taht
2014-03-30 20:51                                       ` Toke Høiland-Jørgensen
2014-03-31 12:42                                         ` Robert Bradley
2014-03-31 17:26                                           ` Robert Bradley
2014-03-22 21:15   ` [Cerowrt-devel] DNSSEC & NTP Bootstrapping Joseph Swick
2014-03-23 10:12     ` Aaron Wood [this message]
2014-03-23 11:15       ` Toke Høiland-Jørgensen
2014-03-23 12:11         ` David Personette
2014-03-23 12:20           ` Toke Høiland-Jørgensen
2014-03-23 12:22         ` Aaron Wood
2014-03-23 22:41           ` Michael Richardson
2014-03-24  9:51             ` Aaron Wood
2014-03-24  9:59               ` Toke Høiland-Jørgensen
2014-03-24 12:29                 ` Chuck Anderson
2014-03-24 13:39                   ` Toke Høiland-Jørgensen
2014-03-24 14:31                     ` Alijah Ballard
2014-03-24 13:54                   ` Valdis.Kletnieks
2014-03-24 19:12 ` Phil Pennock
2014-03-24 20:27   ` David Personette
2014-03-24 21:30     ` Phil Pennock
2014-03-24 21:58     ` Dave Taht
2014-03-25  9:55       ` David Personette
2014-03-25 14:25       ` Michael Richardson
2014-03-24 21:03   ` Toke Høiland-Jørgensen
2014-03-24 22:09     ` Török Edwin
2014-03-24 23:33       ` Toke Høiland-Jørgensen
2014-03-25  1:16         ` Joseph Swick
2014-03-24 22:16     ` Phil Pennock

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

  List information: https://lists.bufferbloat.net/postorius/lists/cerowrt-devel.lists.bufferbloat.net/

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CALQXh-MsLsWeVT_3+XaFQy5d3OcpbkQcgMi0mROuO0J5JS0Q7Q@mail.gmail.com \
    --to=woody77@gmail.com \
    --cc=cerowrt-devel@lists.bufferbloat.net \
    --cc=cerowrt@decoy.cotse.net \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox