Hi,

On a newly installed 6.1 machine, which has its system date set to 15 September 
i.e. 30 days into the past, doing "ntpd -d -s -v" (to not deamonize, to make a 
time sync directly, and print out verbose output), I am told this:

     /var/db/ntpd.drift is empty
     ntp engine ready
     constraint request to 2404:6800:4008:801::2004
     constraint request to 172.217.25.100
     tls constraint failed: 2404:6800:4008:801::2004 (www.google.com): coonect: 
No route to host
     no constraint reply rom 2404:6800:4008:801::2004 received in time, next 
query 900s
     tls write failed: 172.217.25.100 (www.google.com) certificate verification 
failed: certificate not yet valid
     no constraint reply from 172.217.25.100 received in time, next query 900s
     no reply received in time, skipping initial time setting

In other words, LibreSSL will not connect to the remote NTP protocol server, 
because the TLS certificate was issued after 15 Sept 
(https://www.sslshopper.com/ssl-checker.html#hostname=www.google.com says it's 
valid from October 3, 2017 to December 26, 2017), and therefore fail the time 
sync - which leads to reliance that I will update the date manually first to 
make things work.


An effective fix here is to simply remove the "constraints" line in 
/etc/ntpd.conf , this way ntpd makes no attempt to make any TLS connection (to 
https://www.google.com/ which is used as constraint in the default 
/etc/ntpd.conf) and instead just goes into time syncing work with pool.ntp.org .

Maybe the best thing would be to make NTPD obligatorily or optionally, *not* 
dismiss a TLS certificate for the specific reason that its certificate not is 
valid.

If more constraint servers would be added (right now there's only one, 
https://www.google.com) then certainty could be derived from there.

Also, I am not super happy about NTPD connecting by default to www.google.com 
in particular.

A random pool of 50-100 HTTPS servers that are known to generally be available 
out there, would be a better pick. Maybe best thing would be that I simply 
choose some myself and not use the default ntpd.conf .


So to sum up, my best impression presently is that time validation should be 
disabled for TLS certificates within NTPD.

Tinker

Reply via email to