You are only browsing one thread in the discussion! All comments are available on the post page.

Return

mo_ztt ,
@mo_ztt@lemmy.world avatar

Informative article but it meanders about for way too long.

  • In some circumstances, Windows resets its clock based on the ServerUnixTime field of incoming TLS handshakes, for reasons that are not completely clear
  • OpenSSL puts random numbers in ServerUnixTime
  • Problem!
  • Disable via HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesW32TimeSecureTimeLimits

See? That didn’t take long.

flambonkscious ,

So does that mean one needs to run NTP as well as the domain-based time sync, for when the donation based one fails?

Seems weird. I wonder why they’re so cagey about it

mo_ztt ,
@mo_ztt@lemmy.world avatar

Their official advice is to disable STS when using NTP.

As for the explanation, I think it was just an example of bad decisions compounding on themselves.

  • Oh no, it’s difficult to sync time because the secure communication layer doesn’t work when our time is already out of sync. That’s okay, we’ll use a totally other dubious mechanism instead of fixing that.
  • Oh no, the dubious mechanism is giving us bad results sometimes. That’s okay, we’ll introduce weird heuristics to attempt the impossible problem of determining whether the dubious mechanism’s output is trustworthy.
  • Oh no, the heuristic fails sometimes. That’s okay, “We agree that the overall direction of technology with the adaption of TLS v1.3 and other developments in this area could make Secure Time Seeding decreasingly effective over time, but we are not aware of any bugs arising from their use. This technology direction also makes heuristic calculation of time using SSL/TLS far less attractive when compared to deterministic, secure time synchronization.”
  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • All magazines