Newsgroups: comp.archives
Path: utzoo!utgpu!news-server.csri.toronto.edu!ox.com!emv
From: Mills@udel.edu
Subject: [ntp] Re:  vendor supported NTP
Message-ID: <1991Jan16.043821.7501@ox.com>
Followup-To: comp.protocols.time.ntp
Sender: emv@ox.com (Edward Vielmetti)
Reply-To: Mills@udel.edu
Organization: The Internet
References: <9101151551.aa23206@huey.udel.edu>
Date: Wed, 16 Jan 1991 04:38:21 GMT
Approved: emv@ox.com (Edward Vielmetti)
X-Original-Newsgroups: comp.protocols.time.ntp

Archive-name: internet/ntp/ntp-security/1991-01-15
Archive: louie.udel.edu:/pub/ntp/bishop.* [128.175.1.3]
Original-posting-by: Mills@udel.edu
Original-subject: Re:  vendor supported NTP
Reposted-by: emv@ox.com (Edward Vielmetti)

Walter & Co.,

Matt Bishop of the Privacy and Security Task Force did an analysis
of NTP vulnerability. His document (in PostScript) and my response
(in ASCII) can be found on louie.udel.edu as the files pub/ntp/bishop.ps
and pub/ntp/bishop.txt respectively. If interested, I can provide
electric mail transcripts of discussions between OSF, DEC and I about
DTS, NTP and related issues. Since these were informal and unedited,
I would rather not distribute them on other than a need-to-know basis,
even though they were most productive for all parties involved and
led to major improvements in both protocols.

Dave
