Bug 2135583 - Threat model finding: Detection of possible abuse if more than a majority disagree on any scale
Summary: Threat model finding: Detection of possible abuse if more than a majority dis...
Keywords:
Status: ASSIGNED
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: chrony
Version: 9.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Miroslav Lichvar
QA Contact: rhel-cs-infra-services-qe
URL:
Whiteboard:
Depends On: 2231078
Blocks:
TreeView+ depends on / blocked
 
Reported: 2022-10-18 03:34 UTC by Wade Mealing
Modified: 2023-08-15 07:12 UTC (History)
0 users

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed:
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-136798 0 None None None 2022-10-18 03:40:03 UTC

Comment 1 Miroslav Lichvar 2023-01-26 16:35:28 UTC
With the latest upstream code detected falsetickers and the worst case when no majority is reached are logged to syslog as warnings. It's up to the admin to evaluate their number and decide whether it's a random failure of the sources, the local clock, or a potential attack.

Comment 2 Miroslav Lichvar 2023-08-10 13:55:41 UTC
This issue will be fixed by rebase to chrony-4.4 (bug #2231078).


Note You need to log in before you can comment on or make changes to this bug.