Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion: Disable whonix clock randomization? #1206

Open
1 task done
rocodes opened this issue Dec 2, 2024 · 0 comments
Open
1 task done

Discussion: Disable whonix clock randomization? #1206

rocodes opened this issue Dec 2, 2024 · 0 comments

Comments

@rocodes
Copy link
Contributor

rocodes commented Dec 2, 2024

  • I have searched for duplicates or related issues

Description

See freedomofpress/securedrop-workstation-ci#68, and freedomofpress/securedrop-workstation-ci#68 (comment)

Whonix clock randomization can be a source of failed updates and failed SDW provisioning. This is a discussion issue about whether we should disable it, and if so, for how many components. It's also worth bearing in mind that we should aim for a least-complexity/small-scoped-effort solution since we still have an eye on arti integration down the line.

To discuss:

How will this impact SecureDrop/SecureDrop Workstation users?

  • Depends on implementation, see above. Benefits could range from from "fewer errors during preflight updater run" (if scoped to sd vms only) to "fewer errors during install/provisioning and updater run" (if systemwide). Downsides could be potentially intrusive managing of whonix components, which may be used for other non-SDW purposes, and potential loss of anti-fingerprinting mitigation for sdw vms or system vms (needs investigation).
  • In general, journalists are not intended to be anonymous, but I think we should not adjust the default system whonix settings since that makes decisions about whonix config for potentially user-created VMs.

How would this affect the SecureDrop Workstation threat model?

  • See above, needs investigation.

User Stories

  • As a SDW user, I want reliable updates and provisioning with as few errors as possible.
  • As a SDW/Qubes user ("power user"), I don't want SDW to make non-transparent changes to my system VMs/ I want to know what state my networking stack is in.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant