wall clock likely readable by VMs allowing Clock Correlation Attacks

Information

ID: 431
PHID: PHID-TASK-c4ijkloku4sduej5ngb4
Author: Patrick
Status at Migration Time: open
Priority at Migration Time: Normal

Description

Upon start of a VM, it gets its initial time from the host.* Therefore we can conclude by logic, that the virtualizer must somehow provide access of the information (the host time) to the VM.

There are two different mechanisms not to be confused

  • kvmclock - which Whonix KVM libvirt xml files are explicitly not using because of this
  • wall clock

Quote Xen project Mailing List

there is also a pv wallclock (i.e. date and time) interface, but I don’t think that’s what Linux’s clocksource is about

An adversary with the capability to compromise a Whonix-Workstation VM + observer local clock leaks can run a clock correlation attack. Described in more detail here:


*Unless advanced users reading advanced security guide apply Spoof the Initial Virtual Hardware Clock Offset instructions. (Probably very few are doing this.)


TODO #research:

  • gather more information on the wall clock interface
  • find out if the wall clock information is only provided to the VM upon start of the VM or if the wall clock is continuously updated
  • figure out what can be done about this
  • perhaps enable some “only update wallclock at VM start time” feature if available
  • see if KVM has something similar to what Xen had|has /proc/sys/xen/independent_wallclock
  • if applicable, explain upstream and write feature requests

Comments


HulaHoop

2015-11-21 00:52:03 UTC


Patrick

2015-11-21 01:29:41 UTC


HulaHoop

2015-11-24 22:10:33 UTC


Patrick

2015-11-24 23:04:49 UTC


HulaHoop

2015-11-25 03:18:10 UTC


Patrick

2015-11-25 13:22:26 UTC


HulaHoop

2016-09-05 14:10:37 UTC