Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd)

    Scheduled Pinned Locked Moved General pfSense Questions
    136 Posts 14 Posters 33.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DaddyGoD
      DaddyGo
      last edited by

      @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

      But my wife has a BIGGER KNIFE than yours

      šŸ˜‰ I don't think so, we've been entertaining each other for 29 years) - has a big, big fucking big knife :)

      You haven't seen my lady (my darling), she's a real hunter and a real killer... :)

      she ...... :) especially attacks DC grade Cisco stuff, hihihihi
      1G at home is more than enough, but I'm moving on with this
      (basic idea, 10G is coming (in SOHO) and I am already compatible with it, otherwise there is no significant difference at the moment)

      I'm building my own house soon, I'm going to have a lot of trouble deciding what to build from the ground up.... L1

      Cats bury it so they can't see it!
      (You know what I mean if you have a cat)

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @DaddyGo
        last edited by

        @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

        10G is coming (in SOHO) and I am already compatible with it,

        Its already here to be honest.. Just need a few more years for the price to come down before more adoption if you ask me..

        I have a few more years left on my main switch for support.. But as that nears and look for replacement, I would love a reasonable priced.. Say $200ish replacement for my sg300-28 that had atleast a few multigig ports 10ge, but also support 2.5/5ge. And hey poe would also be nice.. Or something that had sfp+ support where the modules are not all that expensive where I could add multigig..

        I have 2.5ge running between my nas and pc, and yeah no way in hell I would ever go back to just gig for that connection.. But it was a bolt on sort of way of getting it with usb dongles.. It works, but much rather have that connection running through the switch vs just san type of connection between pc and nas on different network.

        And my internet is only 500/50 - it works and its fine and ok with the price. I don't really see need for gig to internet for my use.. But would really love to see that at 500/500. 1/1 gig would be fantastic.. But current isps in the area have no sort of symmetrical offerings and the bump to 1000 would still only be 50 up, so its pretty pointless for my use.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        DaddyGoD 1 Reply Last reply Reply Quote 0
        • DaddyGoD
          DaddyGo @johnpoz
          last edited by DaddyGo

          @johnpoz said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

          if you ask me..

          yes I think you are a special guy :)
          don't worry your opinion really matters, I see the energy you add to the forum, respect (!!!)

          I love Cisco at home SMB (SG series). and everywhere else, serious and considered philosophy...

          +++edit:
          I won't forget your SMB3 writeup on the more serious file transfer to Syno
          +++edit2:
          if I remember correctly is it a Realtek 2.5G USB NIC?

          Cats bury it so they can't see it!
          (You know what I mean if you have a cat)

          johnpozJ 1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator @DaddyGo
            last edited by johnpoz

            @daddygo yeah the nic is club3d model, and it realtek chip..

            Using this driver
            https://github.com/bb-qq/r8152

            Overall it has been fine - but it has cut out a few times.. Where I had to unplug it and plug it back in..

            SMB3 multichannel, yeah that is another option to break the 1g barrier for sure - would go back to that if had to go back to gig that is for sure.. Ran that for a couple years, never any issues with it.. But going to 2.5 did get me overall boost in top end speed..

            But yeah multigig or better yet full 10ge is yeah a viable option for the soho, and prices are doable.. Its not like thousands or anything - so it can be done in the home if you want too.. But the price of doing it, is quite a bit more than just gig.. I would of hoped that 2.5/5 would become more mainstream - there are some 2.5 gig switches in the 100$ range out that is making that way more viable and pc makers are starting to include nics that can do 2.5

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.8, 24.11

            bingo600B 1 Reply Last reply Reply Quote 1
            • bingo600B
              bingo600 @johnpoz
              last edited by

              @johnpoz

              AFAIK this is the cheapest 10Gb decent "Home switch"

              MikroTik Cloud Router Switch CRS309-1G-8S+IN

              One on offer here , else around $280
              https://www.ebay.com/itm/363622236174

              I have heard several reports about "fs.com" switches being nice, haven't tried them my self.

              "Home"
              https://www.fs.com/de-en/products/122281.html

              A bit more DC like (40G uplinks)
              https://www.fs.com/de-en/products/108710.html

              Their optics should be quite cheap too.

              But not a "score" like DG's Ciscos

              /Bingo

              If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

              pfSense+ 23.05.1 (ZFS)

              QOTOM-Q355G4 Quad Lan.
              CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
              LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

              DaddyGoD 2 Replies Last reply Reply Quote 0
              • DaddyGoD
                DaddyGo @bingo600
                last edited by

                @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                I have heard several reports about "fs.com" switches being nice, haven't tried them my self.

                do not do this, pls. šŸ˜‰

                I've had a good relationship with FS:COM for a long time, they have super SFP/SFP+ modules, check it out:

                76809298-3a4a-46ba-9c1d-734b4d06a915-image.png

                but don't buy switches from them(!!!), BROADCOM chips are in many units and they are fast, but for example, if you want to set the current time it's simple, but strange....

                by giving them DNS, they are immediately connected to a Chinese server (?)

                if you are interested I will show you this tomorrow, I have Wireshark files about this and a switch like this in the next room in my flat

                5864d594-6f4b-4e13-893a-041170b2b859-image.png

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                bingo600B 1 Reply Last reply Reply Quote 0
                • DaddyGoD
                  DaddyGo @bingo600
                  last edited by

                  @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                  MikroTik Cloud Router Switch CRS309-1G-8S+IN
                  One on offer here , else around $280
                  https://www.ebay.com/itm/363622236174

                  Hmmmm, šŸ˜‰

                  Don't think that MikroTik is stable, look at this conversation, you wonder who I am???? :-)
                  (in this conversation)

                  https://forum.mikrotik.com/viewtopic.php?t=167891

                  CSS610-8G-2S yes that's right it's the same in terms of the fraudulent switch, hhihihi :) - MikroTik Cloud Router Switch CRS309-1G-8S+IN

                  Cats bury it so they can't see it!
                  (You know what I mean if you have a cat)

                  bingo600B 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @DaddyGo
                    last edited by

                    @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                    by giving them DNS, they are immediately connected to a Chinese server (?)

                    Could they be checkking for new firmware ??

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    DaddyGoD 1 Reply Last reply Reply Quote 0
                    • bingo600B
                      bingo600 @DaddyGo
                      last edited by

                      @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                      MikroTik Cloud Router Switch CRS309-1G-8S+IN
                      :

                      Don't think that MikroTik is stable, look at this conversation, you wonder who I am???? :-)

                      Ok ... I was sure i read that the CRS309 (and it had to the that one) , was ok.
                      But then i have seen lots of bugs related to RouterOS ....

                      Thanx for the tip

                      If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                      pfSense+ 23.05.1 (ZFS)

                      QOTOM-Q355G4 Quad Lan.
                      CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                      LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                      DaddyGoD 1 Reply Last reply Reply Quote 0
                      • DaddyGoD
                        DaddyGo @bingo600
                        last edited by

                        @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                        Could they be checkking for new firmware ??

                        Nope, unfortunately FW can only be installed manually...

                        As I followed along with Wireshark, the time is synchronized from a Chinese source via some cPanel route, that in itself is very strange, because it puts you through a lot of redirection.

                        by default you can't even specify it, NTP servers only have their own Chinese source hard coded into them...

                        Neither from GUI nor from CLI you can specify a time server path, say 216.239.35.0 or 162.159.200.123 or etc.

                        I don't like this kind of solution, I want to be in control šŸ˜‰

                        Cats bury it so they can't see it!
                        (You know what I mean if you have a cat)

                        Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                        • DaddyGoD
                          DaddyGo @bingo600
                          last edited by

                          @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                          i have seen lots of bugs related to RouterOS ....

                          Yes I also have some 10G capable MikroTik on the shelf waiting to finally get a stable FW for it, because otherwise they are not bad...

                          Good prices among the 10G things on the market, but then if have say VLAN and say QoS problems not to mention 10G speed negotiation errors (on SFP+ ports) you can't use it well.
                          They'll fix it hope, - they continue to gather dust on the shelf :)

                          Cats bury it so they can't see it!
                          (You know what I mean if you have a cat)

                          1 Reply Last reply Reply Quote 0
                          • Sergei_ShablovskyS
                            Sergei_Shablovsky @DaddyGo
                            last edited by Sergei_Shablovsky

                            @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                            @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                            Could they be checkking for new firmware ??

                            Nope, unfortunately FW can only be installed manually...

                            As I followed along with Wireshark, the time is synchronized from a Chinese source via some cPanel route, that in itself is very strange, because it puts you through a lot of redirection.

                            by default you can't even specify it, NTP servers only have their own Chinese source hard coded into them...

                            Neither from GUI nor from CLI you can specify a time server path, say 216.239.35.0 or 162.159.200.123 or etc.

                            I don't like this kind of solution, I want to be in control šŸ˜‰

                            We goes a little bit off topic, but I also need a drop a few lines:

                            Two years ago, before pandemic started, before attacks on oil/gas lines happened, before issue with SolarWind, I wrote on this forum about our obligation as Security Admins / SysAdmins to stay away from any products from russia/china. Because this authority regimes using ANY TECHNOLOGY and ANY ABILITY as a weapon in a war against US and other democratic countries.
                            Many users reply something like ā€œmy friend, take a foil hat and no worry about!ā€.

                            But let me to point on again and again: from 2018 russia and China would be more and more aggressive in their attacks, using multivectors attacks, complex hardware&software based attacks.

                            And popularity of very cheap/budget price of many network appliances & devices made in China - only one channel of many other to put their weapon in Your business infrastructure and in Your home.

                            P.S. from Jan 2024
                            Two Years ago I wrote this. No any reaction here on forum, even no one set ā€œlikel. But now You see russians attack to Colonel Pipeline, Pentagon internal lans, Chinas drones over the US military bases, russians drones over Bundeswer army’s buildings in Europe and oil/gas terminals in Norvay, lots of attacks on US government lans, russia help Iran and Hamas to attack Israel….
                            Ordinary US SysAdmins not bother too much about all of this (ā€œso far awayā€, etc…), but here in EU we clearly see how 3-rd Wirld War happened RIGHT NOW and only matter of time when US receive power hit from russia and China…
                            Because may be too late.

                            —
                            CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                            Help Ukraine to resist, save civilians people’s lives !
                            (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                            1 Reply Last reply Reply Quote 0
                            • E
                              e-1-1
                              last edited by

                              Opened #10404 a year or so ago for this topic - migration from ntpd to chronyd.
                              In an uninspired moment I set it to "Private" and can't change it to "Public", maybe @Netgate can help.

                              stephenw10S 1 Reply Last reply Reply Quote 0
                              • stephenw10S
                                stephenw10 Netgate Administrator @e-1-1
                                last edited by

                                Ha, I wondered why that was set private. Fixed.

                                1 Reply Last reply Reply Quote 0
                                • Sergei_ShablovskyS
                                  Sergei_Shablovsky @q54e3w
                                  last edited by Sergei_Shablovsky

                                  @q54e3w said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                  I'd rather have PTP personally.

                                  How You to comment this sentence from official Chrony Docs:

                                  2.12. Does chrony support PTP?
                                  No, the Precision Time Protocol (PTP) is not supported as a protocol for synchronisation of clocks and there are no plans to support it.
                                  It is a complex protocol, which shares some issues with the NTP broadcast mode.
                                  One of the main differences between NTP and PTP is that PTP was designed to be easily supported in hardware (e.g. network switches and routers) in order to make more stable and accurate measurements. PTP relies on the hardware support. NTP does not rely on any support in the hardware, but if it had the same support as PTP, it could perform equally well.

                                  On Linux, chrony supports hardware clocks that some NICs have for PTP. They are called PTP hardware clocks (PHC). They can be used as reference clocks (specified by the refclock directive) and for hardware timestamping of NTP packets (enabled by the hwtimestamp directive) if the NIC can timestamp other packets than PTP, which is usually the case at least for transmitted packets. The ethtool -T command can be used to verify the timestamping support.

                                  —
                                  CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                  Help Ukraine to resist, save civilians people’s lives !
                                  (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                  Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                  • Sergei_ShablovskyS
                                    Sergei_Shablovsky @Sergei_Shablovsky
                                    last edited by Sergei_Shablovsky

                                    @sergei_shablovsky said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                    Sentence from official Chrony Docs:

                                    On Linux, chrony supports hardware clocks that some NICs have for PTP. They are called PTP hardware clocks (PHC). They can be used as reference clocks (specified by the refclock directive) and for hardware timestamping of NTP packets (enabled by the hwtimestamp directive) if the NIC can timestamp other packets than PTP, which is usually the case at least for transmitted packets. The ethtool -T command can be used to verify the timestamping support.

                                    I need to add some note about hardware timestamping: no possible to detect correct time correction delta in constantly asymmetrical link.
                                    (For better understanding I will doing that on an example)

                                    Server A make a timestamp (t) and sending packet to Server B
                                    Packet on the road within 30ms
                                    Server B receive packet at time (t+30), make a timestamp and sending reply to Server A
                                    Packet on the road within 70ms (because another route)
                                    Server A receive reply packet with a totally delay (t+30ms+70ms = t+100ms) and Server A make decision that his time need to be corrected on 20ms (100ms / 2 ways - 30ms)

                                    But this is wrong decision (because as You see above one route are 30ms, other route are 70ms).

                                    And no possible at all detecting this by statistics. So, in constantly asymmetrical link, the hardware NIC timestamp also not help to make great correction.

                                    I am not sure is PTP v2 (IEEE-1588-2008) solving this problem?

                                    —
                                    CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                    Help Ukraine to resist, save civilians people’s lives !
                                    (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                    1 Reply Last reply Reply Quote 0
                                    • Sergei_ShablovskyS Sergei_Shablovsky referenced this topic on
                                    • Sergei_ShablovskyS Sergei_Shablovsky referenced this topic on
                                    • Sergei_ShablovskyS
                                      Sergei_Shablovsky @johnpoz
                                      last edited by

                                      @johnpoz said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                      @sergei_shablovsky said in Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                      **really outdated and vulnerable NTPā€ā€ need to be replaced.

                                      What specific vulnerability are you talking about.. Just because NTP has been around long time - does not mean its not been kept up to date for security issues.

                                      One of technics of NTP hacking is described here https://habr.com/ru/companies/ruvds/articles/505938/

                                      (Please use translate.Google.com for reading.)
                                      Only 25mins on Intel Core i5 ;)

                                      —
                                      CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                      Help Ukraine to resist, save civilians people’s lives !
                                      (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                      RobbieTTR 1 Reply Last reply Reply Quote 0
                                      • RobbieTTR
                                        RobbieTT @Sergei_Shablovsky
                                        last edited by RobbieTT

                                        @sergei_shablovsky
                                        Quite a thread resurrection you have there. Regrettably I have become unwilling to click on Russian links.

                                        That said, NTP is easily overlooked as it is a dull topic despite everyone relying on encryption these days.

                                        In my view they called it Network Time Protocol for a reason - primarily it should be on your network, with only redundancy and sanity checks provided by the wider internet.

                                        For years I have had one of these on my LAN:

                                        20210831-TimeNet Pro-VTN-TN-PRO-Front Ports.png

                                        Dedicated NTP time sources don't have to be expensive or be a hacky DIY job on a RPi.

                                        ā˜•ļø

                                        JKnottJ Sergei_ShablovskyS NollipfSenseN 3 Replies Last reply Reply Quote 1
                                        • JKnottJ
                                          JKnott @RobbieTT
                                          last edited by

                                          @robbiett said in Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                          Dedicated NTP time sources don't have to be expensive or be a hacky DIY job on a RPi.

                                          And they're only $639.95!

                                          I'll rely on NTP over the Internet.

                                          PfSense running on Qotom mini PC
                                          i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                          UniFi AC-Lite access point

                                          I haven't lost my mind. It's around here...somewhere...

                                          RobbieTTR Sergei_ShablovskyS 2 Replies Last reply Reply Quote 0
                                          • stephenw10S
                                            stephenw10 Netgate Administrator
                                            last edited by

                                            @robbiett said in Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                            hacky DIY job on a RPi.

                                            But that's the fun part! šŸ˜‰

                                            RobbieTTR 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.