Skip to content

Conversation

@lukevalenta
Copy link
Contributor

Update distributed-web, randomness-beacon, and time-services developer docs

@lukevalenta lukevalenta changed the title RTG-394 update docs owned by Research Team Update docs owned by Research Team Oct 15, 2020
Copy link

@wbl wbl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, but two or three little nits I noticed.

---

# How Access Workers
# How Access Works
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks spurious

Copy link
Contributor Author

@lukevalenta lukevalenta Oct 15, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I'll ping Access team to see if they want me to keep this typo fix in this PR 👍

The NTS protocol is divided into two-phases. The first phase is the NTS key exchange that establishes the necessary key material between the NTP client and the server. This phase uses the Transport Layer Security (TLS) handshake and relies on the same public key infrastructure as the web. Once the keys are exchanged, the TLS channel is closed and the protocol enters the second phase. In this phase the results of that TLS handshake are used to authenticate NTP time synchronization packets via extension fields. For more information, read the [Internet draft](https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-19).
Network Time Security (NTS) provides cryptographic security for the client-server mode of the Network Time Protocol (NTP). This enables users to obtain time in an authenticated manner.

The NTS protocol is divided into two-phases. The first phase is the NTS key exchange that establishes the necessary key material between the NTP client and the server. This phase uses the Transport Layer Security (TLS) handshake and relies on the same public key infrastructure as the web. Once the keys are exchanged, the TLS channel is closed and the protocol enters the second phase. In this phase the results of that TLS handshake are used to authenticate NTP time synchronization packets via extension fields. For more information, read the [Internet draft](https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-19).
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I should have changed this to be RFC 8915 already https://tools.ietf.org/html/rfc8915


## NTS Client

You can use time.cloudflare.com as the source of time for all your devices today with NTP, while NTS clients are still under development.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Chrony now has support, so maybe we need to change this.

Update distributed-web, randomness-beacon, and time-services developer docs
@adamschwartz
Copy link
Contributor

adamschwartz commented Oct 15, 2020

This looks really rad. Thank you!

Please address the conflicts and I’d be happy to merge this in.

@cloudflare-workers-and-pages
Copy link

Deploying cloudflare-docs with  Cloudflare Pages  Cloudflare Pages

Latest commit: d1182f5
Status: ✅  Deploy successful!
Preview URL: https://889d1411.cloudflare-docs-7ou.pages.dev

View logs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants