


For this reason operation with network address translation schemes is not possible. The cookies must have the same IP addresses at both the server and client. They are described along with an executive summary, current status, briefing slides and reading list on the Autonomous Authentication page.Īutokey authenticates individual packets using cookies bound to the IP source and destination addresses. These schemes are exceptionally difficult to cryptanalyze, as the challenge/response exchange data are used only once. Optional identity schemes provide strong security against masquerade and most forms of clogging attacks. Optional identity schemes described on the Autokey Identity Schemes page are based on cryptographic challenge/response exchanges. As used in Autokey, message digests are exceptionally difficult to cryptanalyze, as the keys are used only once.

The Autokey Version 2 protocol described on the Autokey Protocol page verifies packet integrity using message digest algorithms, such as MD5 or SHA, and verifies the source using digital signature schemes, such as RSA or DSA. A recipient can verify the originator has the correct private key using the public key and any of several digital signature algorithms. Public key cryptography is based on a private secret key known only to the originator and a public key known to all participants. Symmetric key cryptography is based on a shared secret key which must be distributed by secure means to all participants. Public key cryptography is generally considered more secure than symmetric key cryptography. This support is available only if the OpenSSL library has been installed and the -enable-autokey option is specified when the distribution is built. This distribution includes support for the Autokey public key algorithms and protocol specified in RFC-5906 "Network Time Protocol Version 4: Autokey Specification". Autokey Public-Key Authentication Autokey Public-Key Authentication
