I meant that as a privacy concern that some users might not be aware of.
As a way of solving that problem one could suggest and point a finger
explicitly on the default ntpd.conf. 

Reasons ? A privacy concern that most users won't be aware of. 

I might have understood you wrong, otto. Please correct me. 

g Stephan

On Sun, Dec 08, 2019 at 10:36:18AM +0100, Otto Moerbeek wrote:
> On Sun, Dec 08, 2019 at 11:15:55AM +0100, List wrote:
> 
> > Please excuse that I wasted your time. You're absolutely right.
> > 
> > The only thing that comes to my mind is that one could add something
> > like a small notice that tells the new user to maybe alter his ntpd
> > constraints to a "TLS-Provider" that resides in his time zone. 
> > A good place for that could be the welcoming mail, which already
> > describes some first steps. 
> 
> Why? You can travel the internet many times around and still be withing
> the bounds the constraint checking allows. As for response time, google
> anycast is pretty good at that.
> 
>       -Otto
> 
> > 
> > 
> > On Sat, Dec 07, 2019 at 11:25:48AM -0700, Theo de Raadt wrote:
> > > >That might be the case. 
> > > >The man page creates the impression that my ntpd will carry out a TLS
> > > >Handshake with "https://www.google.com";. Out of that handshake (because
> > > >it is anycast) you get your approximate local time. Which serves as
> > > >vague measuring point for answers by the ntp servers that you are
> > > >querying. But the suggestion I made is absolutely 100 % wrong.
> > > >
> > > >Would it be an option to choose another Anycast resolving address ?
> > > >For example akami.net ? 
> > > 
> > > akami.net has no https.
> > > maybe you mean akamai.net?  again, no https.
> > > 
> > > many akamai services come out of less capable caches, not making the
> > > same effective certificate promises as the google front-end.  would
> > > you notice if an akamai service did a certificate downgrade? not
> > > really.  i don't think the proposal is serious.
> > > 
> > > as a result we use quad9 and google https because their global
> > > adjacency is excellent, and then we are avoiding cloudflare https
> > > because we added their ticker in the mix (though their anycast ticker
> > > is a very weird thing)
> > > 
> > > >g Stephan
> > > >
> > > >On Thu, Dec 05, 2019 at 03:03:43PM -0700, Theo de Raadt wrote:
> > > >> I guess you don't understand what is going on there.
> > > >> 
> > > >> List <l...@md5collisions.eu> wrote:
> > > >> 
> > > >> > Hello, 
> > > >> > 
> > > >> > here a diff replacing www.google.com as a default time constraint by
> > > >> > www.openbsd.org.
> > > >> > It is claimed that OpenBSD would have sane and secure defaults. While
> > > >> > www.google.com might be secure it ain't sane from a privacy concerned
> > > >> > perspective. Therefore the diff. 
> > > >> > 
> > > >> > Regards,
> > > >> > Stephan
> > > >> > 
> > > >> > Index: etc/ntpd.conf
> > > >> > ===================================================================
> > > >> > RCS file: /cvs/src/etc/ntpd.conf,v
> > > >> > retrieving revision 1.16
> > > >> > diff -u -p -r1.16 ntpd.conf
> > > >> > --- etc/ntpd.conf       6 Nov 2019 19:04:12 -0000       1.16
> > > >> > +++ etc/ntpd.conf       5 Dec 2019 21:36:57 -0000
> > > >> > @@ -8,4 +8,4 @@ sensor *
> > > >> >  
> > > >> >   constraint from "9.9.9.9"              # quad9 v4 without DNS
> > > >> >    constraint from "2620:fe::fe"          # quad9 v6 without DNS
> > > >> >    -constraints from "www.google.com"      # intentionally not 
> > > >> > 8.8.8.8
> > > >> >    +constraints from "www.openbsd.org"      # intentionally not 
> > > >> > Google
> > > >> > 
> > > >> 
> > > >
> > 
> 

Reply via email to