sdwdate Tor Consensus Time Sanity Check

Information

ID: 151
PHID: PHID-TASK-n2ig3pwvolnn67iytzlw
Author: Patrick
Status at Migration Time: resolved
Priority at Migration Time: Normal

Description

problem description:

When the host’s system clock is too much off, Tor won’t be able to connect and since sdwdate runs through Tor, it won’t be able to fix the clock. At the moment in such situations there is no good feedback to the user.


proposal

  • A sdwdate sanity test could be created.
  • Before attempting to fetch the time from Tor hidden services, it could check what Tor is telling us about the clock.
  • Check if times from remote servers match Tor are within consensus/valid-after and consensus/valid-until, otherwise reject those.

caution

  • As per chat log with Roger directory authorities can lie about time - so we need to use this with care.
  • Tor consensus isn’t always downloaded from directly from directory authorities, sometimes Tor downloads the Tor consensus from directory mirrors. And the latter aren’t trusted as much as directory authorities. Those are just like normal relays.
  • We should have the courtesy to not explicitly download from directory authorities, because… armadev: oh. i think that would be horrible. hundreds of thousands of users doing that could overwhelm the directory authorities.

misc:

     "consensus/valid-after"
     "consensus/fresh-until"
     "consensus/valid-until"
      Each of these produces an ISOTime describing part of the lifetime of
      the current (valid, accepted) consensus that Tor has.
      [New in Tor 0.2.6.3-alpha]

Deprecated:


credits:

Extensive research and guess work done by @HulaHoop and @Patrick.


scope:

The scope of this ticket is to create a sdwdate sanity test. It would be a user of anondate.

Comments


Patrick

2017-02-24 22:56:44 UTC


Patrick

2017-02-25 04:26:23 UTC


Patrick

2017-05-16 14:04:53 UTC


Patrick

2017-12-02 21:20:44 UTC