I set clockVM as downstream qube,(if at all), and block update checks
from sys-net and sy-firewall.
I also set the firewall to block any traffic originating from those
infrastructure qubes.
I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.
What kind of information does ClockVM leak on the clearnet?
What kind of information can my ISP get from NTP requests from ClockVM?
Although, like @qubist, I’ve never seen ClockVM in Qubes, I first heard about this term in this discussion. Before that, I only knew that clocksync is a service generally assigned to sys-net.
What? No.
clockvm is a property of a Qubes system, like netvm is a property of a
qube.
You can set it in the Global Config GUI, or with qubes-prefs clockvm
Well, if you are taking steps to run all traffic through Tor, but leave
timesyncd alone to run in the clear, that helps with fingerprinting your
system as Qubes.
I never presume to speak for the Qubes team.
When I comment in the Forum I speak for myself.
Let’s say I’m using custom obfs4 bridges. For my ISP, it appears I’m just visiting random websites, which I can confirm using Sniffnet. What harm does clocksync cause by giving my IP to an NTP server? If sending a request to NTP servers can reveal that the request is generated from a Linux machine, then that’s a problem.
The update check of Fedora on the clearnet seems to be an issue. I’ve added an update check exception in global configurations and disabled update checks for sys-net and sys-firewall. Now I’m hoping the Fedora update check won’t happen on the clearnet.
However, if the dom0 update check is also done on the clearnet, that will be a huge problem.
It seems Fedora qubes use Fedora’s NTP servers. This might give some information about your OS (although one could use Fedora NTP server without using Fedora).
I started observing clocksync requests to NTP servers since yesterday. My Clock Qube is sys-net-dvm, which is Fedora-based.
Yesterday, it was sending NTP requests to some ISP company—I forgot the name—and today it is sending NTP requests to time.cloudflare.com.
So, it sent NTP requests to two different servers in two days. Is that normal?
In these two days, it did not send NTP requests to the Fedora NTP server. As it sent requests to two different servers in two days, is it possible it will also send requests to the Fedora NTP server?
I’m confused. Shouldn’t there be only one NTP server for the Clock Qube to send requests to?
That’s not how NTP best practices work. The NTP servers themselves can drift or become malicious, so polling/asking 3-4 servers ensures that you get the time correctly.
Sys-whonix is my default NetVM, and no qube is directly connected to sys-firewall except for sys-whonix. So, it must be an upstream qube, meaning it’s either sys-net-dvm or sys-firewall. Right?
I was monitoring traffic on Sniffnet using my external IP, so I couldn’t determine which qube generated it. I’ll monitor the traffic now using the internal IP; maybe that will provide some insight.
I’m not sure of the correct term for this. By “external IP,” I mean that if I’m not mistaken, sys-net uses two interfaces: one to connect with the internet device, such as a router or any device providing internet, and the second to connect with sys-firewall and internal Qubes.
I was monitoring the interface that connects with the router. This interface does not show whether the traffic is generated by sys-net itself or coming from sys-firewall.
Update: I just checked on Sniffnet, and sys-net-dvm is generating NTP requests to time.cloudflare.com instead of receiving them from another qube.
Should I ask the question here or create a new post for it? I want to know how to change the FallbackNTPServers and ServerName entries in the timesync configuration so that it won’t send NTP requests to Fedora NTP servers.
In addition to the pre-configured (by Fedora and/or Qubes) NTP servers, each interface can get specific, higher priority NTP severs configured by e.g., DHCP. So if your ISP router at home is configured by its upstream (ISP) to use time.cloudflare.com, it will pass this info thru DHCP. I’d double-check the router for its DHCP server configuration (or whatever device acts as a DHCP server on your net).
Edited to add:
On the other hand, this NTP connection does not leak anything, if all the ISP devices are configured like this. You’re just one small tree in the big forest