Windows feature that resets system clocks based on random data is wreaking havoc

Windows Secure Time Seeding resets clocks months or years off the correct time.

https://arstechnica.com/security/2023/08/windows-feature-that-resets-system-clocks-based-on-random-data-is-wreaking-havoc/?utm_brand=arstechnica&utm_social-type=owned&utm_source=mastodon&utm_medium=social

Windows feature that resets system clocks based on random data is wreaking havoc

Windows Secure Time Seeding resets clocks months or years off the correct time.

Ars Technica
@arstechnica
Lol. You use the current time to seed #RandomNumbers, not the other way around!
@arstechnica so, if I understand this correctly, things like ntpsec are not to be trusted, because you would need to reach out to the network, so instead, they reach out to the network. Got it.
@kubefred @arstechnica I think the idea is that they cache _past_ successful trusted certificates as a trust root, then calculate the difference based on their time stamps. Which might work if that field reliably contained timestamps.

@arstechnica TLDR: #nih

As NTP is too widespread to Embrace Extend Exterminate, a brand new Windows-only system is created. To everyone's surprise, it hits every bullet point from Falsehoods Programmers Believe About Time.

@arstechnica if I'm reading this right, it's because the SSL Handshake response uses random data and Windows assumed it was a Unix timestamp?
@TheChrisGlass @arstechnica my read is that in the spec the handshake/communication requires a number that should always be different in each message. and it traditionally has been the unix time or partially composed from unix time. but there are implantations that use a random number instead to increase security.
@arstechnica "The culprit was a little-known feature in Windows" means that this is a rare example of "it's not a feature, it's a bug."