Join GitHub today
GitHub is home to over 20 million developers working together to host and review code, manage projects, and build software together.
Protection against rogue time-changes (use integrity protecting time protocol) #153
Comments
rugk
changed the title from
Protectionn against rogue time-changes (use integrity protecting time protocol)
to
Protection against rogue time-changes (use integrity protecting time protocol)
Jan 28, 2016
thestinger
added
the
Type: enhancement
label
Jan 28, 2016
thestinger
added
the
upstream
label
Feb 5, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Feb 5, 2016
Contributor
Google appears to be adopting tlsdate upstream: https://android.googlesource.com/platform/external/tlsdate/. It's possible that it will be part of 7.0. So it wouldn't be a great thing to work on in CopperheadOS since it seems to be happening already.
|
Google appears to be adopting tlsdate upstream: https://android.googlesource.com/platform/external/tlsdate/. It's possible that it will be part of 7.0. So it wouldn't be a great thing to work on in CopperheadOS since it seems to be happening already. |
thestinger
removed
the
upstream
label
Jul 8, 2016
thestinger
added
the
Priority: low
label
Jun 11, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Show comment Hide comment
thestinger
Jan 25, 2018
Contributor
They never ended up using tlsdate for mobile, only Android Things uses it for now. I'll keep trying to get this done upstream just like DNS over TLS because they do want to do that kind of thing.
|
They never ended up using tlsdate for mobile, only Android Things uses it for now. I'll keep trying to get this done upstream just like DNS over TLS because they do want to do that kind of thing. |
rugk commentedJan 28, 2016
It would be very good to have some protection against time-change attacks (e.g. important for 2FA/TOTP, HSTS and HPKP and HTTPS certs in general).
I would encourage you to use tlsdate by @ioerror: https://github.com/ioerror/tlsdate/