blob: 8e907d3ff670e832f732bd56e10bd2f0b75aab0a [file] [log] [blame]
tlsdate: secure parasitic rdate replacement
tlsdate sets the local clock by securely connecting with TLS to remote
servers and extracting the remote time out of the secure handshake. Unlike
ntpdate, tlsdate uses TCP, for instance connecting to a remote HTTPS or TLS
enabled service, and provides some protection against adversaries that try to
feed you malicious time information.
On Debian GNU/Linux and related systems, we provide an init.d script that
controls the tlsdated daemon. It will notice network changes and regularly
invoke tlsdate to keep the clock in sync. Start it like so:
/etc/init.d/tlsdate start
Here is an example an unprivileged user fetching the remote time:
% tlsdate -v -V -n
V: tlsdate version 0.0.1
V: We were called with the following arguments:
V: validate SSL certificates host = www.ptb.de:443
V: time is currently 1342197117.577381
V: using TLSv1_client_method()
V: SSL certificate verification passed
V: server time 1342197117 (difference is about 0 s) was fetched in 705 ms
Fri Jul 13 18:31:57 CEST 2012
This is an example run - starting as root and dropping to nobody:
% sudo ./tlsdate -v
V: tlsdate version 0.0.1
V: We were called with the following arguments:
V: validate SSL certificates host = www.ptb.de:443
V: time is currently 1342197222.273552
V: using TLSv1_client_method()
V: SSL certificate verification passed
V: server time 1342197222 (difference is about 0 s) was fetched in 520 ms
V: setting time succeeded
Here is an example with a custom host and custom port without verification:
% sudo tlsdate -v --skip-verification -p 80 -H rgnx.net
V: tlsdate version 0.0.1
V: We were called with the following arguments:
V: disable SSL certificate check host = rgnx.net:80
WARNING: Skipping certificate verification!
V: time is currently 1342197285.298607
V: using TLSv1_client_method()
V: Certificate verification skipped!
V: server time 1342197286 (difference is about -1 s) was fetched in 765 ms
V: setting time succeeded
Here is an example of a false ticker that is detected and rejected:
% sudo tlsdate -v -H facebook.com
V: tlsdate version 0.0.1
V: We were called with the following arguments:
V: validate SSL certificates host = facebook.com:443
V: time is currently 1342197379.931852
V: using TLSv1_client_method()
V: SSL certificate verification passed
V: server time 2693501503 (difference is about -1351304124 s) was fetched in 724 ms
remote server is a false ticker from the future!
Here is an example where a system may not have any kind of RTC at boot. Do the
time warp to restore sanity and do so with a leap of faith:
% sudo tlsdate -v -V -l -t
V: tlsdate version 0.0.1
V: We were called with the following arguments:
V: validate SSL certificates host = www.ptb.de:443
V: RECENT_COMPILE_DATE is 1342407042.000000
V: time is currently 1342488229.659967
V: time is greater than RECENT_COMPILE_DATE
V: using TLSv1_client_method()
V: freezing time for x509 verification
V: remote peer provided: 1342488230, prefered over compile time: 1342407042
V: freezing time with X509_VERIFY_PARAM_set_time
V: SSL certificate verification passed
V: server time 1342488230 (difference is about -1 s) was fetched in 791 ms
Mon Jul 16 18:23:50 PDT 2012
V: setting time succeeded