-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dom0 clock is behind reality #68
Comments
To try to avoid it being out of sync before provisioning begins. Fixes #68.
Happened again in https://ws-ci-runner.securedrop.org/2024-06-26-191634739526-cbb6ad92028564b062e7412c49df722fc2f22332-Qubes_4.2_A-update_20240626043626.log.txt
Not sure if whonix is special in this regard. |
|
|
According to the whonix docs, this feature can be disabled via The initial impetus for the feature is for anti-fingerprinting purposes, but there has been much discussion over its implementation, and also upstream discussion of breakage and whether to make the feature opt-out or opt-in. Initially I was going to just propose disabling it on CI (easy/uncontroversial; we would apply the change, reboot the ci machine, then start from that change before doing our own sdw provisioning). But, per discussion in the forum and qubes repo, and knowing that Whonix updates are a frequent source of updater failures and therefore a big user pain point, it could be worth discussing disabling this on prod machines. To make that decision I think we'd need more information on a couple things: 1) how viable an anti-fingerprinting method is it really (see forum post for discussion) and 2) if it's a viable anti-fingerprinting technique, is there a case for that for our journalist users (and is it worth the sometimes breakage). I haven't looked into this or even where the setting is applied, but if for example we were able to apply this setting to just sd-whonix, leaving the default whonix configuration untouched on prod machines, that would be a pretty uncontroversial change. |
I think we should prioritize freedomofpress/securedrop-workstation#1060, or at least the return to To expand a bit on my comment: We are downloading whonix templates, but we aren't running the recommended/provided qvm.anon-whonix Salt state afterwards. This does things that include adding tags (which, among other things, govern the qubes.GetDate RPC policy for whonix vms....), and which ensure that whonix vms are set up in the tested, upstream-expected manner. If after making this change, we still see regular failures of this kind, we can look again at clock randomization etc, but we may be causing a problem here by deviating from the expected whonix setup. |
Flagged by @rocodes:
This is a race condition with apt-test being published to more frequently, but at that time the dom0 clock was
2024-06-10-23:18:38:891521
, while apt-test had published atDate: Mon, 10 Jun 2024 23:19:59 UTC
.The clock is probably off, which is somewhat expected since we just booted the VM. We should force a
sudo qvm-sync-clock
before provisioning.The text was updated successfully, but these errors were encountered: