Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NTP woes

    Scheduled Pinned Locked Moved General pfSense Questions
    33 Posts 7 Posters 2.9k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • F
      furom @stephenw10
      last edited by

      @stephenw10 said in NTP woes:

      @furom said in NTP woes:

      I am reluctant to let NTP traffic out...

      From clients or from pfSense itself?
      Either would be fine though I'm not sure why you think it would be a bad idea.

      Steve

      Yes, I have probably found some "worry about everything treads". These days much focus is on secure protocols, where NTP is not exactly one of them. My only aim is to make the best possible use of the Netgate/pfSense. I really love it in comparison to what I have used over the years.

      If NTP indeed is considered harmless, I should allow that, but I would then like to limit what NTP resources clients can get time from. Out of the box, they want to connect to their own ones. Can this be done in a reasonable easy way?

      Thanks

      1 Reply Last reply Reply Quote 0
      • F
        furom @AndyRH
        last edited by

        @andyrh said in NTP woes:

        I am not sure why letting NTP out is bad. If you want to go that route you will need another method of getting the time.

        No, probably isn't. I just read some threads about the age of the protocol and it not being encrypted. Got stuck in that I guess.

        1 Reply Last reply Reply Quote 0
        • F
          furom @JKnott
          last edited by

          @jknott said in NTP woes:

          @furom

          The big hand is on the... 😉

          Actually, I have my NTP server set up to use 4 public sources,

          Thanks, perhaps a NTP server of my own is what I need to get what I want? I basically want to control where my clients go to get their time. Your setup sounds neat, but a bit complicated for simpler needs perhaps?

          JKnottJ 1 Reply Last reply Reply Quote 0
          • F
            furom @JPP 0
            last edited by

            @jpp-0 said in NTP woes:

            For the vast majority of people using the public pool or https://www.cloudflare.com/time/ is fine. If you don't mind leap smearing time.google.com is also good.

            Agreed, this is probably what I should go for, keeping a stratum server going is a bit much for my needs, I was just concerned about security of the protocol. But as said below, I probably over-thinked this a bit... :)

            F JKnottJ 2 Replies Last reply Reply Quote 0
            • F
              furom @furom
              last edited by

              @furom said in NTP woes:

              @jpp-0 said in NTP woes:

              For the vast majority of people using the public pool or https://www.cloudflare.com/time/ is fine. If you don't mind leap smearing time.google.com is also good.

              Agreed, this is probably what I should go for, keeping a stratum server going is a bit much for my needs, I was just concerned about security of the protocol. But as said below, I probably over-thinked this a bit... :)

              A nice addition would be to use NTPv3, but for some reason cant find where to get the auth keys... will continue looking :)

              1 Reply Last reply Reply Quote 0
              • JKnottJ
                JKnott @furom
                last edited by

                @furom

                A NTP server is built into pfsense. You just have to configure it. It's not difficult. You just select some public servers to use and enable the NTP server. It's really that simple. You only need one server, but can use multiple for redundancy. If nothing else, you could just use pool.ntp.org. I even created a DNS alias for it, so that my portable devices will use my server at home and the real pool.ntp.org when I'm away.

                BTW, my Asus tablet wants to use some server in Asia, so I also created an alias for that server to point it to mine. If manufacturers insist on hard coding an NTP server, they should be using pool.ntp,org, which will geolocate the best server.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                V F 2 Replies Last reply Reply Quote 1
                • JKnottJ
                  JKnott @furom
                  last edited by

                  @furom said in NTP woes:

                  Agreed, this is probably what I should go for, keeping a stratum server going is a bit much for my needs

                  Every NTP server is a stratum server. If you use a stratum 1 source, yours becomes stratum 2, with 15 the maximum. Sources such as a GPS receiver are stratum 0, so the NTP server connected to it becomes stratum 1.

                  Here's some NTP info.

                  PfSense running on Qotom mini PC
                  i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                  UniFi AC-Lite access point

                  I haven't lost my mind. It's around here...somewhere...

                  F 1 Reply Last reply Reply Quote 0
                  • V
                    viragomann @JKnott
                    last edited by

                    @jknott said in NTP woes:

                    BTW, my Asus tablet wants to use some server in Asia, so I also created an alias for that server to point it to mine.

                    I simply redirect any NTP requests from my networks to pfSense LAN address, as well as DNS.

                    121f7579-bb4f-410d-852c-1efb51a1c1df-grafik.png

                    Should also work with localhost as target.

                    F 1 Reply Last reply Reply Quote 1
                    • F
                      furom @viragomann
                      last edited by

                      @viragomann said in NTP woes:

                      @jknott said in NTP woes:

                      BTW, my Asus tablet wants to use some server in Asia, so I also created an alias for that server to point it to mine.

                      I simply redirect any NTP requests from my networks to pfSense LAN address, as well as DNS.

                      121f7579-bb4f-410d-852c-1efb51a1c1df-grafik.png

                      Should also work with localhost as target.

                      Well, simple when you know it :) Much appreciated, will try to configure this. I suppose I could use destination "This firewall" instead of any LAN Address? Thanks!

                      V 1 Reply Last reply Reply Quote 0
                      • F
                        furom @JKnott
                        last edited by

                        @jknott said in NTP woes:

                        @furom said in NTP woes:

                        Agreed, this is probably what I should go for, keeping a stratum server going is a bit much for my needs

                        Every NTP server is a stratum server. If you use a stratum 1 source, yours becomes stratum 2, with 15 the maximum. Sources such as a GPS receiver are stratum 0, so the NTP server connected to it becomes stratum 1.

                        Here's some NTP info.

                        Oh! Will read some. I thought "stratum" was when you had your own GPS. Thanks for the link! :)

                        JKnottJ 1 Reply Last reply Reply Quote 0
                        • F
                          furom @JKnott
                          last edited by

                          @jknott said in NTP woes:

                          @furom

                          A NTP server is built into pfsense. You just have to configure it. It's not difficult. You just select some public servers to use and enable the NTP server. It's really that simple. You only need one server, but can use multiple for redundancy. If nothing else, you could just use pool.ntp.org. I even created a DNS alias for it, so that my portable devices will use my server at home and the real pool.ntp.org when I'm away.

                          BTW, my Asus tablet wants to use some server in Asia, so I also created an alias for that server to point it to mine. If manufacturers insist on hard coding an NTP server, they should be using pool.ntp,org, which will geolocate the best server.

                          That was the part I was qondering a bit about, but saw @viragomann had already shared his redirect rule for this. Will give it a go! Thanks! :)

                          1 Reply Last reply Reply Quote 0
                          • V
                            viragomann @furom
                            last edited by viragomann

                            @furom said in NTP woes:

                            I suppose I could use destination "This firewall" instead of any LAN Address?

                            I don't think, that "This firewall" will work, since it covers multiple IPs. As far as I know, that's not working in redirect targets.
                            As I mentioned, localhost or even single address > 127.0.0.1 should work as well.

                            "Internal" is a interface group in my setup, including all internal interfaces I want to rule apply to.

                            Edit localhost thx to @Bob-Dig 😊

                            F 1 Reply Last reply Reply Quote 2
                            • Bob.DigB
                              Bob.Dig LAYER 8
                              last edited by

                              Here are my rules, working so far.

                              b.PNG

                              a.PNG

                              F 1 Reply Last reply Reply Quote 2
                              • F
                                furom @viragomann
                                last edited by

                                @viragomann said in NTP woes:

                                "Internal" is a interface group in my setup, including all internal interfaces I want to rule apply to.

                                Had no idea these existed! This makes things a bit easier, thanks!

                                1 Reply Last reply Reply Quote 0
                                • F
                                  furom @Bob.Dig
                                  last edited by

                                  @bob-dig said in NTP woes:

                                  a.PNG

                                  Thanks! I get the first two lines, but what is the third used for?

                                  Bob.DigB 1 Reply Last reply Reply Quote 0
                                  • Bob.DigB
                                    Bob.Dig LAYER 8 @furom
                                    last edited by Bob.Dig

                                    @furom said in NTP woes:

                                    I get the first two lines, but what is the third used for?

                                    It is not needed here but if the host is already connecting to the firewall, then this is allowed and I don't have to make the rule on that interface.

                                    Now, that I am thinking about it, my solution to not redirect traffic already going to the firewall isn't that great to look at, probably should redirect everything.

                                    F V 2 Replies Last reply Reply Quote 1
                                    • F
                                      furom @Bob.Dig
                                      last edited by

                                      @bob-dig Thanks for explaining, and well, it helped me... :)

                                      1 Reply Last reply Reply Quote 0
                                      • F
                                        furom
                                        last edited by

                                        But... With this NTP redirect rule in place, should I still need to allow each network access to the NTP server?? I thought this was that setup, or have I managed to get something wrong...

                                        It works, I now see the pfSense IP instead of a pool one for NTP, but, is this expected?

                                        1 Reply Last reply Reply Quote 0
                                        • V
                                          viragomann @Bob.Dig
                                          last edited by

                                          @bob-dig said in NTP woes:

                                          I get the first two lines, but what is the third used for?

                                          It is not needed here but if the host is already connecting to the firewall, then this is allowed and I don't have to make the rule on that interface.

                                          I'd say, the third one is all you really need.
                                          It covers all interface assigned addresses as well as localhost. And since you don't redirect interface IPs, you need all of them.
                                          But you can spare the first two rules, since the third covers also both protocols, IPv4 and v6.

                                          1 Reply Last reply Reply Quote 1
                                          • F
                                            furom
                                            last edited by

                                            Interesting... It seemed to be working, then I renamed the interface group, and while the config looks ok (reflects the new name), it now tries to get NTP from all over the place again...

                                            V 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.