On 5/9/22 02:38, Hal Murray via devel wrote:
Does anybody know how the initial time gets set on a Raspberry Pi -- before
ntpd gets called?
I believe you're looking for "fake-hwclock". It periodically saves the time to a file (allegedly* /etc/fake-hwclock.data) and restores it on boot.

* My home pi died, so I can't immediately double-check this.

Should we do something like set the time to the time stamp of the drift file?
(if it is significantly newer than the current time)

Probably not.

I still think we need a more comprehensive approach to this bootstrapping problem. The problem is, I don't have the time to write it. But I gave my thoughts before:
https://lists.ntpsec.org/pipermail/devel/2019-February/007576.html

The only update I have is that this statement is not true: "A normal CA will not issue certificates that are valid longer than their root". Let's Encrypt is serving a chain to the expired DST Root for enhanced compatibility with old Android devices.

That could backfire if, somehow, the system time got set into the future.

I had that happen once. It might have been due to a GPS rollover.

--
Richard

Attachment: OpenPGP_signature
Description: OpenPGP digital signature

_______________________________________________
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to