Re: NTP switch in gnome-control-center is broken

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



An active MITM attackr could change the system time by intercepting NTP
packets. Such an attack could be used, for example, to bypass HSTS, as
described in [1], which specifically criticizes Fedora's default
configuration as insecure on page three (though I imagine chrony must
have some limits as to how far the system clock can be changed at a
time?). It looks like ntpd can be configured to prevent such if the NTP
server signs its messages and the client is configured with its public
key. It seems safe to assume timesyncd cannot handle this; is that
correct? What's the status with chrony?

[1]
https://www.blackhat.com/docs/eu-14/materials/eu-14-Selvi-Bypassing-HTTP-Strict-Transport-Security-wp.pdf

Attachment: signature.asc
Description: This is a digitally signed message part

-- 
desktop mailing list
desktop@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/desktop

[Index of Archives]     [Fedora Users]     [Fedora KDE]     [Fedora Announce]     [Fedora Docs]     [Fedora Config]     [PAM]     [Red Hat Development]     [Red Hat 9]     [Gimp]     [Yosemite News]

  Powered by Linux