TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Broken VPNs, the Year 2038, and certs that expired 100 years ago

153 pointsby kdp747over 1 year ago

13 comments

eszedover 1 year ago
This is a great mystery story, with a satisfying ending. And this<p>&gt; I generally start troubleshooting an issue by asking the system what it is doing,&quot; explained Zimmie. &quot;Packet captures, poking through logs, and so on. After a few rounds of this, I start hypothesizing a reason, and testing my hypothesis. Basic scientific method stuff. Most are simple to check. When they&#x27;re wrong, I just move on. As I start narrowing down the possibilities, and the hypotheses are proven, it&#x27;s electric. Making an educated guess and proving it&#x27;s right is incredibly satisfying.<p>is an approach every every one of us should internalize.
评论 #39335606 未加载
评论 #39337825 未加载
评论 #39336952 未加载
m3047over 1 year ago
Ran into a case where a whole datacenter became untethered from its NTP upstream and drifted off into a timezone of its own creation. Customer was failing authentication for a data product we sold them (TSIG was failing). I was on the phone with them for an hour, reassuring them constantly that everything was working for our other customers, tailing logs, and reporting what I saw.<p>More datacenter stakeholders kept joining the call, most of whom had nothing to do with our data product. Many times I heard people ask &quot;have they found the problem yet&quot; as though.. what? We were the best tech support they had for an entire data center going dark? After an hour somebody noticed that the clocks on servers in the datacenter didn&#x27;t match up with their laptop; shortly after that I was able to extricate myself from the call... still watching the logs, their downloads started working again a short while later.
评论 #39336576 未加载
dancemethisover 1 year ago
I have a very soft spot for this kind of &quot;campfire story&quot;. Open Office not printing on Tuesdays comes to mind. Anyone got some more?
评论 #39335462 未加载
评论 #39337863 未加载
评论 #39335471 未加载
评论 #39355367 未加载
评论 #39344020 未加载
denton-scratchover 1 year ago
&gt; I suspect the NTP server had a badly faulty internal clock which ran very fast.<p>A time server with a defective clock seems to be a serious problem. Zimmie says the time server was an appliance; so someone is selling as an appliance a time server that can&#x27;t tell the time.
评论 #39339842 未加载
评论 #39343213 未加载
arter4over 1 year ago
They 2038 thing I get, but the clock drift of BILLIONS of seconds really scares me. What kind of fucked up setup can lead to something like this?
macintuxover 1 year ago
Not nearly as interesting a story: in 1996 I visited a customer who was using up for dialup services, but reported some of their Windows desktops couldn&#x27;t connect.<p>It didn&#x27;t take me long to figure out that the computers that weren&#x27;t working had their clocks set well into the 21st century. The shell couldn&#x27;t even display the year properly, I assumed a Y2K incompatibility, but after so many years now I can&#x27;t remember exactly what I saw.<p>Anyway, easy fix, but I never did find out what caused such a weird glitch in their environment. It&#x27;s small wonder that many people aren&#x27;t fluent with computers: they misbehave in such a wide variety of ways.
评论 #39336417 未加载
vdaeaover 1 year ago
Why does this NTP implementation accept a sudden change of 4 billion seconds? For example, the NTP implementation in Windows refuses to change the clock by more than 54,000 seconds.
评论 #39340389 未加载
评论 #39341292 未加载
cesarbover 1 year ago
This reminded me of this article from last year: <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2023&#x2F;08&#x2F;windows-feature-that-resets-system-clocks-based-on-random-data-is-wreaking-havoc&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2023&#x2F;08&#x2F;windows-feature-tha...</a> (HN discussion: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37151220">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=37151220</a>)
8organicbitsover 1 year ago
I&#x27;m not sure I see why it was revoking the certificates, when you renew a certificate that&#x27;s about to expire you can just let the old one expire, right?
评论 #39335675 未加载
评论 #39335806 未加载
bdw5204over 1 year ago
The solution to the year 2038 problem is to upgrade your time since the Unix epoch fields to 64 bit integers. Hopefully this won&#x27;t be an actual issue 14 years from now because it&#x27;s such a simple fix.
评论 #39338673 未加载
评论 #39336013 未加载
raffraffraffover 1 year ago
Oh NTP... I remember a series of extremely annoying incidents that were caused by time skew on hundreds of Linux VMs in our data center. Our setup was typical of a startup - built to be good enough at first, and fall apart at scale.<p>Every VM ran CentOS, and every one of them hit the default CentOS ntp servers. These are run by volunteers. The pool is generally good quality but using it the way we did was extremely stupid.<p>Every few weeks we&#x27;d have one of these &quot;events&quot; where hundreds of VMs in a data center would skew, causing havok with authentication, replication, clustering. We also had an alert that would notify the machine owner if drift exceeded some value. If that happened in the middle of the night, the oncall from every single team would get woken. And if they simply &quot;acked&quot; the alert and go back to sleep, the drift would continue, and by morning their service would almost certainly be suffering.<p>Whatever about diagnosing the cause, I started by writing a script that executed a time fix against a chosen internal server, just to resolve the immediate issue. I also converted the spam alert into one that Sensu (the monitoring&#x2F;alerting system we used) would aggregate into a single alert to the fleet ops team. In other words, if &gt;2% of machines was skewed by more than a few seconds, warn us. At &gt;4%, go critical. (Only critical alerts would alert oncall outside sociable hours).<p>Long story short, we switched to chrony, because unlike ntpd we could convince it to &quot;just fix the damn time&quot;, because ntpd would refuse to correct the time if the jump was too big, and would just drift off forever until manually fixed. (No amount of config hacking and reading &#x27;man ntpd&#x27; got around this). We also chose two bare-metal servers in each data center to work as internal NTP servers, reducing the possibility of DOSing these volunteer NTP servers and getting our IP range blacklisted or fed dud data. Problem solved right there, and we also ended up with better monitoring of our time skew across our fleet.
frereubuover 1 year ago
Related and fascinating article that came up on HN recently after the originator of NTP, David Mills, died: <a href="https:&#x2F;&#x2F;www.newyorker.com&#x2F;tech&#x2F;annals-of-technology&#x2F;the-thorny-problem-of-keeping-the-internets-time" rel="nofollow">https:&#x2F;&#x2F;www.newyorker.com&#x2F;tech&#x2F;annals-of-technology&#x2F;the-thor...</a><p>(Just turn off JavaScript to read it if you hit a paywall).
pxeger1over 1 year ago
&gt; the CRL size for the median certificate is 51KB and that half of all CRLs are under 900B.<p>What? So there are no CRLs between 900B and 51KB, and the first one larger than 51KB just happened to be the median one??
评论 #39336404 未加载