Thursday, September 7. 2017
In Search of a Secure Time Source
Trackbacks
Trackback specific URI for this entry
No Trackbacks
Comments
Display comments as
(Linear | Threaded)
FWIW I believe that NTPsec currently intends to adopt NTS some time post-1.0.
For someone who’s talking about security, how about just installing the more secure SSL library, LibreSSL, and be secure and happy?
This requires that the time be relatively close to correct, otherwise certificate validation will fail due to the client thinking the cerificate is not-yet-valid or expired.
Story time: Tails has something called httpdate (which i believe is not the only thing called that) which uses the http date header from various https sites.
It has a list of many sites divided into three categories, "friend", "foe", and "neutral". It connects to a random one from each category and selects the median of the three values.
But, it does this over Tor, and connecting to Tor requires the clock to already be accurate within a few hours. So, as of a couple years ago (and maybe still today), booting tails on a machine with a clock set to the distant past (eg, with a dead clock battery) resulted in a series of tor restarts which would get the clock closer and closer to right until httpdate could run.
First it would fail due to the certificate validity on the TLS connection to a tor directory server. Then it would set its clock to the beginning of the validity period, restart tor, and try again, connecting to a different directory server. Different directory authorities have different validity periods on their certs, so this step could result in several restarts of tor. After the clock is close enough for the TLS connection to be made, it would receive a tor directory consensus with a much smaller validity period (a few hours, iirc), and set the clock to the beginning of that time, and then restart tor once more. Finally tor could bootstrap, and httpdate could run to get a more accurate time.
It has a list of many sites divided into three categories, "friend", "foe", and "neutral". It connects to a random one from each category and selects the median of the three values.
But, it does this over Tor, and connecting to Tor requires the clock to already be accurate within a few hours. So, as of a couple years ago (and maybe still today), booting tails on a machine with a clock set to the distant past (eg, with a dead clock battery) resulted in a series of tor restarts which would get the clock closer and closer to right until httpdate could run.
First it would fail due to the certificate validity on the TLS connection to a tor directory server. Then it would set its clock to the beginning of the validity period, restart tor, and try again, connecting to a different directory server. Different directory authorities have different validity periods on their certs, so this step could result in several restarts of tor. After the clock is close enough for the TLS connection to be made, it would receive a tor directory consensus with a much smaller validity period (a few hours, iirc), and set the clock to the beginning of that time, and then restart tor once more. Finally tor could bootstrap, and httpdate could run to get a more accurate time.
Hanno, you seem to have come upon the same idea as phk (who started the ntimed rewrite but didn't finish). See: http://phk.freebsd.dk/time/20151212.html
I'll connect you two by email.
I'll connect you two by email.