Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd)

    Scheduled Pinned Locked Moved General pfSense Questions
    136 Posts 14 Posters 41.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator @DaddyGo
      last edited by

      @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

      10G is coming (in SOHO) and I am already compatible with it,

      Its already here to be honest.. Just need a few more years for the price to come down before more adoption if you ask me..

      I have a few more years left on my main switch for support.. But as that nears and look for replacement, I would love a reasonable priced.. Say $200ish replacement for my sg300-28 that had atleast a few multigig ports 10ge, but also support 2.5/5ge. And hey poe would also be nice.. Or something that had sfp+ support where the modules are not all that expensive where I could add multigig..

      I have 2.5ge running between my nas and pc, and yeah no way in hell I would ever go back to just gig for that connection.. But it was a bolt on sort of way of getting it with usb dongles.. It works, but much rather have that connection running through the switch vs just san type of connection between pc and nas on different network.

      And my internet is only 500/50 - it works and its fine and ok with the price. I don't really see need for gig to internet for my use.. But would really love to see that at 500/500. 1/1 gig would be fantastic.. But current isps in the area have no sort of symmetrical offerings and the bump to 1000 would still only be 50 up, so its pretty pointless for my use.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      DaddyGoD 1 Reply Last reply Reply Quote 0
      • DaddyGoD
        DaddyGo @johnpoz
        last edited by DaddyGo

        @johnpoz said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

        if you ask me..

        yes I think you are a special guy :)
        don't worry your opinion really matters, I see the energy you add to the forum, respect (!!!)

        I love Cisco at home SMB (SG series). and everywhere else, serious and considered philosophy...

        +++edit:
        I won't forget your SMB3 writeup on the more serious file transfer to Syno
        +++edit2:
        if I remember correctly is it a Realtek 2.5G USB NIC?

        Cats bury it so they can't see it!
        (You know what I mean if you have a cat)

        johnpozJ 1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @DaddyGo
          last edited by johnpoz

          @daddygo yeah the nic is club3d model, and it realtek chip..

          Using this driver
          https://github.com/bb-qq/r8152

          Overall it has been fine - but it has cut out a few times.. Where I had to unplug it and plug it back in..

          SMB3 multichannel, yeah that is another option to break the 1g barrier for sure - would go back to that if had to go back to gig that is for sure.. Ran that for a couple years, never any issues with it.. But going to 2.5 did get me overall boost in top end speed..

          But yeah multigig or better yet full 10ge is yeah a viable option for the soho, and prices are doable.. Its not like thousands or anything - so it can be done in the home if you want too.. But the price of doing it, is quite a bit more than just gig.. I would of hoped that 2.5/5 would become more mainstream - there are some 2.5 gig switches in the 100$ range out that is making that way more viable and pc makers are starting to include nics that can do 2.5

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          bingo600B 1 Reply Last reply Reply Quote 1
          • bingo600B
            bingo600 @johnpoz
            last edited by

            @johnpoz

            AFAIK this is the cheapest 10Gb decent "Home switch"

            MikroTik Cloud Router Switch CRS309-1G-8S+IN

            One on offer here , else around $280
            https://www.ebay.com/itm/363622236174

            I have heard several reports about "fs.com" switches being nice, haven't tried them my self.

            "Home"
            https://www.fs.com/de-en/products/122281.html

            A bit more DC like (40G uplinks)
            https://www.fs.com/de-en/products/108710.html

            Their optics should be quite cheap too.

            But not a "score" like DG's Ciscos

            /Bingo

            If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

            pfSense+ 23.05.1 (ZFS)

            QOTOM-Q355G4 Quad Lan.
            CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
            LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

            DaddyGoD 2 Replies Last reply Reply Quote 0
            • DaddyGoD
              DaddyGo @bingo600
              last edited by

              @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

              I have heard several reports about "fs.com" switches being nice, haven't tried them my self.

              do not do this, pls. šŸ˜‰

              I've had a good relationship with FS:COM for a long time, they have super SFP/SFP+ modules, check it out:

              76809298-3a4a-46ba-9c1d-734b4d06a915-image.png

              but don't buy switches from them(!!!), BROADCOM chips are in many units and they are fast, but for example, if you want to set the current time it's simple, but strange....

              by giving them DNS, they are immediately connected to a Chinese server (?)

              if you are interested I will show you this tomorrow, I have Wireshark files about this and a switch like this in the next room in my flat

              5864d594-6f4b-4e13-893a-041170b2b859-image.png

              Cats bury it so they can't see it!
              (You know what I mean if you have a cat)

              bingo600B 1 Reply Last reply Reply Quote 0
              • DaddyGoD
                DaddyGo @bingo600
                last edited by

                @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                MikroTik Cloud Router Switch CRS309-1G-8S+IN
                One on offer here , else around $280
                https://www.ebay.com/itm/363622236174

                Hmmmm, šŸ˜‰

                Don't think that MikroTik is stable, look at this conversation, you wonder who I am???? :-)
                (in this conversation)

                https://forum.mikrotik.com/viewtopic.php?t=167891

                CSS610-8G-2S yes that's right it's the same in terms of the fraudulent switch, hhihihi :) - MikroTik Cloud Router Switch CRS309-1G-8S+IN

                Cats bury it so they can't see it!
                (You know what I mean if you have a cat)

                bingo600B 1 Reply Last reply Reply Quote 0
                • bingo600B
                  bingo600 @DaddyGo
                  last edited by

                  @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                  by giving them DNS, they are immediately connected to a Chinese server (?)

                  Could they be checkking for new firmware ??

                  If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                  pfSense+ 23.05.1 (ZFS)

                  QOTOM-Q355G4 Quad Lan.
                  CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                  LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                  DaddyGoD 1 Reply Last reply Reply Quote 0
                  • bingo600B
                    bingo600 @DaddyGo
                    last edited by

                    @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                    MikroTik Cloud Router Switch CRS309-1G-8S+IN
                    :

                    Don't think that MikroTik is stable, look at this conversation, you wonder who I am???? :-)

                    Ok ... I was sure i read that the CRS309 (and it had to the that one) , was ok.
                    But then i have seen lots of bugs related to RouterOS ....

                    Thanx for the tip

                    If you find my answer useful - Please give the post a šŸ‘ - "thumbs up"

                    pfSense+ 23.05.1 (ZFS)

                    QOTOM-Q355G4 Quad Lan.
                    CPUĀ  : Core i5 5250U, Ram : 8GB Kingston DDR3LV 1600
                    LANĀ  : 4 x Intel 211, DiskĀ  : 240G SAMSUNG MZ7L3240HCHQ SSD

                    DaddyGoD 1 Reply Last reply Reply Quote 0
                    • DaddyGoD
                      DaddyGo @bingo600
                      last edited by

                      @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                      Could they be checkking for new firmware ??

                      Nope, unfortunately FW can only be installed manually...

                      As I followed along with Wireshark, the time is synchronized from a Chinese source via some cPanel route, that in itself is very strange, because it puts you through a lot of redirection.

                      by default you can't even specify it, NTP servers only have their own Chinese source hard coded into them...

                      Neither from GUI nor from CLI you can specify a time server path, say 216.239.35.0 or 162.159.200.123 or etc.

                      I don't like this kind of solution, I want to be in control šŸ˜‰

                      Cats bury it so they can't see it!
                      (You know what I mean if you have a cat)

                      Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                      • DaddyGoD
                        DaddyGo @bingo600
                        last edited by

                        @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                        i have seen lots of bugs related to RouterOS ....

                        Yes I also have some 10G capable MikroTik on the shelf waiting to finally get a stable FW for it, because otherwise they are not bad...

                        Good prices among the 10G things on the market, but then if have say VLAN and say QoS problems not to mention 10G speed negotiation errors (on SFP+ ports) you can't use it well.
                        They'll fix it hope, - they continue to gather dust on the shelf :)

                        Cats bury it so they can't see it!
                        (You know what I mean if you have a cat)

                        1 Reply Last reply Reply Quote 0
                        • Sergei_ShablovskyS
                          Sergei_Shablovsky @DaddyGo
                          last edited by Sergei_Shablovsky

                          @daddygo said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                          @bingo600 said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                          Could they be checkking for new firmware ??

                          Nope, unfortunately FW can only be installed manually...

                          As I followed along with Wireshark, the time is synchronized from a Chinese source via some cPanel route, that in itself is very strange, because it puts you through a lot of redirection.

                          by default you can't even specify it, NTP servers only have their own Chinese source hard coded into them...

                          Neither from GUI nor from CLI you can specify a time server path, say 216.239.35.0 or 162.159.200.123 or etc.

                          I don't like this kind of solution, I want to be in control šŸ˜‰

                          We goes a little bit off topic, but I also need a drop a few lines:

                          Two years ago, before pandemic started, before attacks on oil/gas lines happened, before issue with SolarWind, I wrote on this forum about our obligation as Security Admins / SysAdmins to stay away from any products from russia/china. Because this authority regimes using ANY TECHNOLOGY and ANY ABILITY as a weapon in a war against US and other democratic countries.
                          Many users reply something like ā€œmy friend, take a foil hat and no worry about!ā€.

                          But let me to point on again and again: from 2018 russia and China would be more and more aggressive in their attacks, using multivectors attacks, complex hardware&software based attacks.

                          And popularity of very cheap/budget price of many network appliances & devices made in China - only one channel of many other to put their weapon in Your business infrastructure and in Your home.

                          P.S. from Jan 2024
                          Two Years ago I wrote this. No any reaction here on forum, even no one set ā€œlikel. But now You see russians attack to Colonel Pipeline, Pentagon internal lans, Chinas drones over the US military bases, russians drones over Bundeswer army’s buildings in Europe and oil/gas terminals in Norvay, lots of attacks on US government lans, russia help Iran and Hamas to attack Israel….
                          Ordinary US SysAdmins not bother too much about all of this (ā€œso far awayā€, etc…), but here in EU we clearly see how 3-rd Wirld War happened RIGHT NOW and only matter of time when US receive power hit from russia and China…
                          Because may be too late.

                          —
                          CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                          Help Ukraine to resist, save civilians people’s lives !
                          (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                          1 Reply Last reply Reply Quote 0
                          • E
                            e-1-1
                            last edited by

                            Opened #10404 a year or so ago for this topic - migration from ntpd to chronyd.
                            In an uninspired moment I set it to "Private" and can't change it to "Public", maybe @Netgate can help.

                            stephenw10S 1 Reply Last reply Reply Quote 0
                            • stephenw10S
                              stephenw10 Netgate Administrator @e-1-1
                              last edited by

                              Ha, I wondered why that was set private. Fixed.

                              1 Reply Last reply Reply Quote 0
                              • Sergei_ShablovskyS
                                Sergei_Shablovsky @q54e3w
                                last edited by Sergei_Shablovsky

                                @q54e3w said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                I'd rather have PTP personally.

                                How You to comment this sentence from official Chrony Docs:

                                2.12. Does chrony support PTP?
                                No, the Precision Time Protocol (PTP) is not supported as a protocol for synchronisation of clocks and there are no plans to support it.
                                It is a complex protocol, which shares some issues with the NTP broadcast mode.
                                One of the main differences between NTP and PTP is that PTP was designed to be easily supported in hardware (e.g. network switches and routers) in order to make more stable and accurate measurements. PTP relies on the hardware support. NTP does not rely on any support in the hardware, but if it had the same support as PTP, it could perform equally well.

                                On Linux, chrony supports hardware clocks that some NICs have for PTP. They are called PTP hardware clocks (PHC). They can be used as reference clocks (specified by the refclock directive) and for hardware timestamping of NTP packets (enabled by the hwtimestamp directive) if the NIC can timestamp other packets than PTP, which is usually the case at least for transmitted packets. The ethtool -T command can be used to verify the timestamping support.

                                —
                                CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                Help Ukraine to resist, save civilians people’s lives !
                                (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                Sergei_ShablovskyS 1 Reply Last reply Reply Quote 0
                                • Sergei_ShablovskyS
                                  Sergei_Shablovsky @Sergei_Shablovsky
                                  last edited by Sergei_Shablovsky

                                  @sergei_shablovsky said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                  Sentence from official Chrony Docs:

                                  On Linux, chrony supports hardware clocks that some NICs have for PTP. They are called PTP hardware clocks (PHC). They can be used as reference clocks (specified by the refclock directive) and for hardware timestamping of NTP packets (enabled by the hwtimestamp directive) if the NIC can timestamp other packets than PTP, which is usually the case at least for transmitted packets. The ethtool -T command can be used to verify the timestamping support.

                                  I need to add some note about hardware timestamping: no possible to detect correct time correction delta in constantly asymmetrical link.
                                  (For better understanding I will doing that on an example)

                                  Server A make a timestamp (t) and sending packet to Server B
                                  Packet on the road within 30ms
                                  Server B receive packet at time (t+30), make a timestamp and sending reply to Server A
                                  Packet on the road within 70ms (because another route)
                                  Server A receive reply packet with a totally delay (t+30ms+70ms = t+100ms) and Server A make decision that his time need to be corrected on 20ms (100ms / 2 ways - 30ms)

                                  But this is wrong decision (because as You see above one route are 30ms, other route are 70ms).

                                  And no possible at all detecting this by statistics. So, in constantly asymmetrical link, the hardware NIC timestamp also not help to make great correction.

                                  I am not sure is PTP v2 (IEEE-1588-2008) solving this problem?

                                  —
                                  CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                  Help Ukraine to resist, save civilians people’s lives !
                                  (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                  1 Reply Last reply Reply Quote 0
                                  • Sergei_ShablovskyS Sergei_Shablovsky referenced this topic on
                                  • Sergei_ShablovskyS Sergei_Shablovsky referenced this topic on
                                  • Sergei_ShablovskyS
                                    Sergei_Shablovsky @johnpoz
                                    last edited by

                                    @johnpoz said in Chrony, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                    @sergei_shablovsky said in Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                    **really outdated and vulnerable NTPā€ā€ need to be replaced.

                                    What specific vulnerability are you talking about.. Just because NTP has been around long time - does not mean its not been kept up to date for security issues.

                                    One of technics of NTP hacking is described here https://habr.com/ru/companies/ruvds/articles/505938/

                                    (Please use translate.Google.com for reading.)
                                    Only 25mins on Intel Core i5 ;)

                                    —
                                    CLOSE SKY FOR UKRAINE https://youtu.be/_tU1i8VAdCo !
                                    Help Ukraine to resist, save civilians people’s lives !
                                    (Take an active part in public protests, push on Your country’s politics, congressmans, mass media, leaders of opinion.)

                                    RobbieTTR 1 Reply Last reply Reply Quote 0
                                    • RobbieTTR
                                      RobbieTT @Sergei_Shablovsky
                                      last edited by RobbieTT

                                      @sergei_shablovsky
                                      Quite a thread resurrection you have there. Regrettably I have become unwilling to click on Russian links.

                                      That said, NTP is easily overlooked as it is a dull topic despite everyone relying on encryption these days.

                                      In my view they called it Network Time Protocol for a reason - primarily it should be on your network, with only redundancy and sanity checks provided by the wider internet.

                                      For years I have had one of these on my LAN:

                                      20210831-TimeNet Pro-VTN-TN-PRO-Front Ports.png

                                      Dedicated NTP time sources don't have to be expensive or be a hacky DIY job on a RPi.

                                      ā˜•ļø

                                      JKnottJ Sergei_ShablovskyS NollipfSenseN 3 Replies Last reply Reply Quote 1
                                      • JKnottJ
                                        JKnott @RobbieTT
                                        last edited by

                                        @robbiett said in Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                        Dedicated NTP time sources don't have to be expensive or be a hacky DIY job on a RPi.

                                        And they're only $639.95!

                                        I'll rely on NTP over the Internet.

                                        PfSense running on Qotom mini PC
                                        i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                                        UniFi AC-Lite access point

                                        I haven't lost my mind. It's around here...somewhere...

                                        RobbieTTR Sergei_ShablovskyS 2 Replies Last reply Reply Quote 0
                                        • stephenw10S
                                          stephenw10 Netgate Administrator
                                          last edited by

                                          @robbiett said in Chrony, PTP, Network Time Security (NTS, NTPsec) to replace unsecure/old NTP (ntpd):

                                          hacky DIY job on a RPi.

                                          But that's the fun part! šŸ˜‰

                                          RobbieTTR 1 Reply Last reply Reply Quote 0
                                          • RobbieTTR
                                            RobbieTT @JKnott
                                            last edited by RobbieTT

                                            @jknott said

                                            And they're only $639.95!

                                            I'll rely on NTP over the Internet.

                                            Ouch! Mine was 'only' £109 on eBay. When did they become so expensive??

                                            Edit: The last one I purchased was 'just' £100 including expedited delivery, back in 2021:

                                             2023-04-25 at 14.03.20.png

                                            I guess I should have purchased a boatload of them. šŸ˜‚

                                            ā˜•ļø

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.