Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This reply doesn’t match your comment on time servers tracking you by IP address. Even with encrypted DNS, your DNS servers can track you the same way your time servers can. I don’t understand your points clearly.


Sorry I diverged a bit. You're right: DoH servers can still see when a box is online and possible keep logs/timestamps of requests. I would trust a DoH server more than a standard DNS server simply because it would be catastrophic for a DoH server's reputation if they were found to be handing over logs to third parties. Cloudflare keeps logs for 24 hours then deletes: but there's still that time window of a day to worry about :/

BTW: You can nuke NTP requests by doing:

        sudo ufw deny out to any port 123


What is it that your worried about there? And how is it different from likely sending the same information over in SNI a moment later?


Sounds like he doesn't trust his NTP provider and doesn't want his IP address being sent to the NTP provider, because he wasnt to pretend his IP address is not online.

But he does trust cloudflare for his DNS requests.

Cloudflare run NTP, so just use their server.

The only threat I can see is if someone intercepts his NTP traffic, but they could intercept the DNS traffic too and see his SYNs (and indeed pass them on with you not even noticing)

His concern seems to be more about the IP leaking rather than the NTP result being incorrect, however in the latter case then yes, NTP isn't signed, so it's possible for someone to skew your clock by a few seconds if they were to intercept your traffic to all your NTP servers.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: