-
Notifications
You must be signed in to change notification settings - Fork 10.4k
Update docs owned by Research Team #95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update docs owned by Research Team #95
Conversation
wbl
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good, but two or three little nits I noticed.
| --- | ||
|
|
||
| # How Access Workers | ||
| # How Access Works |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks spurious
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, I'll ping Access team to see if they want me to keep this typo fix in this PR 👍
| The NTS protocol is divided into two-phases. The first phase is the NTS key exchange that establishes the necessary key material between the NTP client and the server. This phase uses the Transport Layer Security (TLS) handshake and relies on the same public key infrastructure as the web. Once the keys are exchanged, the TLS channel is closed and the protocol enters the second phase. In this phase the results of that TLS handshake are used to authenticate NTP time synchronization packets via extension fields. For more information, read the [Internet draft](https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-19). | ||
| Network Time Security (NTS) provides cryptographic security for the client-server mode of the Network Time Protocol (NTP). This enables users to obtain time in an authenticated manner. | ||
|
|
||
| The NTS protocol is divided into two-phases. The first phase is the NTS key exchange that establishes the necessary key material between the NTP client and the server. This phase uses the Transport Layer Security (TLS) handshake and relies on the same public key infrastructure as the web. Once the keys are exchanged, the TLS channel is closed and the protocol enters the second phase. In this phase the results of that TLS handshake are used to authenticate NTP time synchronization packets via extension fields. For more information, read the [Internet draft](https://tools.ietf.org/html/draft-ietf-ntp-using-nts-for-ntp-19). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I should have changed this to be RFC 8915 already https://tools.ietf.org/html/rfc8915
|
|
||
| ## NTS Client | ||
|
|
||
| You can use time.cloudflare.com as the source of time for all your devices today with NTP, while NTS clients are still under development. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Chrony now has support, so maybe we need to change this.
Update distributed-web, randomness-beacon, and time-services developer docs
|
This looks really rad. Thank you! Please address the conflicts and I’d be happy to merge this in. |
Deploying cloudflare-docs with
|
| Latest commit: |
d1182f5
|
| Status: | ✅ Deploy successful! |
| Preview URL: | https://889d1411.cloudflare-docs-7ou.pages.dev |
Update distributed-web, randomness-beacon, and time-services developer docs