Insecure time synchronization and the leaking of time data exposes the user to a subset of advanced deanonymization attacks. The attack vectors and possible mitigations are described below.
Table: Time Attack Vectors
|Denial of Service||The UDP-based NTP protocol can be abused to cause much larger replies than normal, causing systems to be overwhelmed. These are known as amplification attacks. |
|Locating Onion Services||Timers can leak CPU data. Under some circumstances, related activity data can lead to deanonymization of an onion service: |
|Remote Code Execution||NTP is a buggy and ancient protocol. Flaws in NTP clients can be remotely exploited to allow an adversary control over the system. The unencrypted and unauthenticated nature of NTP makes this attack trivial for network adversaries of any size.  |
|Remote Device Fingerprinting||Clock leaks arising from either software on the host or application-level protocols on Whonix-Workstation ™ (|
|Replay Attacks||Replaying an older time allows an adversary to: 
Clock Leak Vectors
Certain protocol properties leak clock information.
Table: Clock Leak Vectors 
|ICMP Timestamps||Leak host time in query replies. |
|NTP Clients||Leak host time  and expose the system to every attack outlined above.|
|TCP Initial Sequence Numbers (ISNs)||Even when timers do not fully leak the host's clock, they can allow side-channel attacks because sensitive information about a system's CPU activity is leaked.  This information is leaked in any traffic sent over clearnet. It can therefore be linked to maliciously induced load patterns on an onion site, resulting in deanonymization. |
|TCP Timestamps||Included in every TCP packet, these leak system information down to the millisecond, as well as system uptime. They also permit fingerprinting of devices behind a router. |
It is practically possible to block all of the clock leak vectors in the preceding section. Users running onion services or those who require very high-level security are strongly recommended to apply the measures below.
Whonix ™ Solutions and Limitations
Whonix ™ has implemented sdwdate as a secure time synchronization mechanism to replace NTP.  sdwdate-gui  is the GUI front-end. sdwdate was written with safety in mind and to avoid the many security pitfalls in NTP. Furthermore, NTP is UDP-based and cannot work over Tor, and onion services must have an accurate clock to be reachable.
sdwdate fetches its time exclusively from reputable sources -- whistle-blowing and privacy-friendly onion sites -- that are very likely to be hosted on different hardware. sdwdate also benefits from the security of Tor's end-to-end encryption.
sdwdate can only protect against passive timestamp linkage of data leaking from both the host and Whonix-Workstation ™ (
anon-whonix). It cannot defend against a skilled adversary that is able to compromise Whonix-Workstation ™ (
anon-whonix). Via a clock correlation attack, the adversary would discover the host clock when the VM is rebooted, and then link the time readings with any host clock leaks. The only way to prevent this and similar attacks is to stop the leaks in the first place.
TCP ISN CPU Information Leak Protection using tirdad [archive]. --> https://forums.whonix.org/t/tcp-isn-cpu-information-leak-protection-tirdad/8552 [archive]
- See Don't update NTP - stop using it [archive] and The Rising Sophistication of Network Scanning [archive].
- https://blog.hboeck.de/archives/863-Dont-update-NTP-stop-using-it.html [archive]
- https://www.cvedetails.com/vulnerability-list/vendor_id-2153/NTP.html [archive]
- See http://www.caida.org/publications/papers/2005/fingerprinting/ [archive] and Tor Browser upstream bug #3059 for the kind of application-level leaks that can happen: Find some way to deal with time-based fingerprints [archive].
- This is possible because cryptographic verification depends on an accurate system clock. For example, a clock set to two years in the past will accept certificates or updates which have already expired or been revoked.
- https://tails.boum.org/contribute/design/Time_syncing/ [archive]
- http://caia.swin.edu.au/talks/CAIA-TALK-080728A.pdf [archive]
- http://www.networksorcery.com/enp/protocol/icmp/msg13.htm [archive]
- https://trac.torproject.org/projects/tor/ticket/16659#comment:13 [archive]
- https://trac.torproject.org/projects/tor/ticket/16659#comment:10 [archive]
- https://trac.torproject.org/projects/tor/ticket/16659 [archive]
- https://mailman.boum.org/pipermail/tails-dev/2013-December/004520.html [archive]
- http://www.freedesktop.org/software/systemd/man/timedatectl.html [archive]
- https://www.digitalocean.com/community/tutorials/how-to-setup-a-firewall-with-ufw-on-an-ubuntu-and-debian-cloud-server [archive]
- https://blog.patternsinthevoid.net/cve-2016-5696-and-its-effects-on-tor.html [archive]
- - slide 9 [archive]
- https://github.com/Whonix/sdwdate [archive]
- https://github.com/Whonix/sdwdate-gui [archive]
- https://bitguard.wordpress.com/2019/09/03/an-analysis-of-tcp-secure-sn-generation-in-linux-and-its-privacy-issues/ [archive]
This is a wiki. Want to improve this page? Help is welcome and volunteer contributions are happily considered! Read, understand and agree to Conditions for Contributions to Whonix ™, then Edit! Edits are held for moderation. Policy of Whonix Website and Whonix Chat and Policy On Nonfreedom Software applies.
Copyright (C) 2012 - 2020 ENCRYPTED SUPPORT LP. Whonix ™ is a trademark. Whonix ™ is a licensee [archive] of the Open Invention Network [archive]. Unless otherwise noted, the content of this page is copyrighted and licensed under the same Freedom Software license as Whonix ™ itself. (Why?)