'\" t .\" Title: ntp.keys .\" Author: [FIXME: author] [see http://docbook.sf.net/el/author] .\" Generator: DocBook XSL Stylesheets v1.79.1 .\" Date: 11/18/2019 .\" Manual: NTPsec .\" Source: NTPsec 1.1.3 .\" Language: English .\" .TH "NTP\&.KEYS" "5" "11/18/2019" "NTPsec 1\&.1\&.3" "NTPsec" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" ntp.keys \- NTP symmetric key file format .SH "DESCRIPTION" .sp This document describes the format of an NTP symmetric key file\&. For a description of the use of this type of file, see the "Authentication Support" page of the Web documentation\&. .sp ntpd(8) reads its keys from a file specified using the \-k command line option or the \fIkeys\fR statement in the configuration file\&. While key number 0 is fixed by the NTP standard (as 56 zero bits) and may not be changed, one or more keys numbered between 1 and 65535 may be arbitrarily set in the keys file\&. .sp The key file uses the same comment conventions as the configuration file\&. Key entries use a fixed format of the form .sp .if n \{\ .RS 4 .\} .nf keyno type key .fi .if n \{\ .RE .\} .sp where keyno is a positive integer (between 1 and 65535), type is the message digest algorithm, and key is the key itself\&. .sp The file does not need to be sorted by keyno\&. .sp type can be any digest type supported by your OpenSSL package\&. Digests longer than 20 bytes will be trucnated\&. .sp You can probably get a list from man 1 dgst or openssl help\&. (As of Jan 2018, they lie\&. Be sure to try it\&. ntpd(8) will print an error on startup if a selected type isn\(cqt supported\&.) .sp The following types are widely supported: .sp .if n \{\ .RS 4 .\} .nf md5, sha1, ripemd160, sha224, sha256, sha384, sha512 .fi .if n \{\ .RE .\} .sp FIPS 140\-2, FIPS 180\-4, and/or FIPS 202 may restrict your choices\&. If it matters to you, check with your lawyer\&. (Let us know if you find a good reference\&.) .sp The key may be printable ASCII excluding "#" or hex encoded\&. Keys longer than 20 characters are assumed to be hex\&. The max length of a (possibly de\-hexified) key is 32 bytes\&. If you want to use an ASCII key longer than 20 bytes, you must hexify it\&. .sp Note that the keys used by the ntpq(1) programs are checked against passwords entered by hand, so it is generally appropriate to specify these keys in ASCII format\&. Or you can cut\-paste a hex string from your password manager\&. .SH "USAGE" .sp In order to use symmetric keys, the client side configuration file needs: .sp .if n \{\ .RS 4 .\} .nf keys trustedkey server \&.\&.\&. key .fi .if n \{\ .RE .\} .sp The server side needs: .sp .if n \{\ .RS 4 .\} .nf keys trustedkey .fi .if n \{\ .RE .\} .sp Note that the client and server key files must both contain identical copies of the line specified by keyno\&. .SH "FILES" .PP /etc/ntp\&.keys .RS 4 is a common location for the keys file .RE .sp Reminder: You have to keep it secret\&. .SH "SEE ALSO" .sp ntp\&.conf(5), ntpd(8), ntpq(1), ntpkeygen(8), ntpdig(1)\&.