On Tue, Sep 27, 2016 at 09:15:47PM +0000, Jeremy Rand wrote: > johnyju...@sigaint.org: > >> The "listening" services are less of a concern, since the firewall > >> wouldn't permit any incoming connections to be passed through to start > >> with. It's the "phone home" style services, like time sync, Samba name > >> lookups on microsoft servers, and such, that are more concerning, and > >> privacy-busting. > > > > The paranoid part of me (which is about 95% of me) half-suspects that NTP > > is actively monitored by the powers that be, to keep tabs on us > > security-minded Linux geeks. > > > > There's been enough major security bugs in NTP, that one must wonder if > > they're akin to the heartbleed/rng/SSL/etc. compromises that don't > > necessarily look like innocent mistakes. > > > > Qubes is good at trying to get dom0 to push the time to the VM's by its > > own means. And if you set the ClockVM to sys-whonix, say, you remove, or > > at least greatly reduce, the ability of TPTB to track your setting your > > clock. :) > > > > However, as mentioned, the default of using NTP time syncing is enabled by > > default in the Debian-8 template, which defeats that protection for Debian > > Appvms, unless you disable it in the template. Just an oversight, I'm > > sure. (No sarcasm, for once.) > > > > My PC's RT clock might drift by a few seconds each week, if that; I'm not > > sure why time synchronization has to be so damn frequent and aggressive. > > A red flag for the paranoid. :) > > > > I have a RS232 GPS dongle that spits out the time with 1-second accuracy > > (or atomic-clock level accuracy, if you use the 1-second clock-tick signal > > available on one of the chips, which I have done, lol). > > > > I plan on hooking that up to my Qubes setup in the near future, and > > disabling network-based clock sync all together. > > > > (Until Qubes 4.0 comes out, forces me to upgrade to a newer motherboard > > with no RS232 support. :) ) > > > > Might be a good open-sourced hardware project. I think I've seen some out > > there already, although not necessarily integrated smoothly into Qubes. > > > > Just one more hole to make sure we plug. > > > > JJ > > You might find Jake Appelbaum's tlsdate interesting, or Adam Langley's > Roughtime. Both are quite a bit more secure than NTP, although tlsdate > doesn't work with TLS 1.3, and Roughtime is still a proof of concept. > > Cheers, > -Jeremy >
Or sdwdate in Whonix -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To post to this group, send email to qubes-users@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/20160927220140.GC5446%40thirdeyesecurity.org. For more options, visit https://groups.google.com/d/optout.