Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    NTP server issue in PFSense 2.7.2 ?

    Scheduled Pinned Locked Moved General pfSense Questions
    12 Posts 4 Posters 1.4k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NollipfSenseN
      NollipfSense @DBMandrake
      last edited by

      @DBMandrake said in NTP server issue in PFSense 2.7.2 ?:

      so am I OK to just disable Kiss of Death,

      I would...if just to see whether it resolve your issue.

      pfSense+ 23.09 Lenovo Thinkcentre M93P SFF Quadcore i7 dual Raid-ZFS 128GB-SSD 32GB-RAM PCI-Intel i350-t4 NIC, -Intel QAT 8950.
      pfSense+ 23.09 VM-Proxmox, Dell Precision Xeon-W2155 Nvme 500GB-ZFS 128GB-RAM PCIe-Intel i350-t4, Intel QAT-8950, P-cloud.

      D 1 Reply Last reply Reply Quote 0
      • D
        DBMandrake @NollipfSense
        last edited by DBMandrake

        @NollipfSense Well, so far it does resolve the issue.

        But I'd like to get a better understanding of why changing one of the default settings is seemingly necessary to have it working at all in 2.7.2.

        I'm pretty sure this wasn't an issue in older versions of PFSense, and I have certainly never customised this setting before so I'm guessing that something changed either in the default configuration or the underlying NTP daemon in one of the updates between 2.6.0 and 2.72. (I have upgraded through every intermediate version)

        Better understanding of the underlying issue is also helpful for anyone else searching for an answer to this problem who comes across this thread to know whether my suggestion is a good idea or just a workaround.

        1 Reply Last reply Reply Quote 0
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Hmm, nothing has changed with regard to that setting between 2.6 and 2.7.2. You can check the generated file in /var/etc/ntpd.conf.

          D 1 Reply Last reply Reply Quote 0
          • D
            DBMandrake @stephenw10
            last edited by

            @stephenw10 New binary with slightly different behaviour due to the new FreeBSD base version ?

            The ntpd.conf doesn't show anything particularly interesting - the kod option is present or absent in the config file depending on the GUI choice as would be expected.

            I don't have a 2.6.0 system handy to see what the default setting for kod is when NTP is installed, or what ntpd.conf is generated however - is it possible the default setting for kod has changed at some point ?

            S 1 Reply Last reply Reply Quote 0
            • stephenw10S
              stephenw10 Netgate Administrator
              last edited by

              It's possible the kod option is interpreted differently.

              1 Reply Last reply Reply Quote 0
              • S
                serbus @DBMandrake
                last edited by

                @DBMandrake

                Hello!

                Maybe related to https://github.com/nagios-plugins/nagios-plugins/issues/687

                John

                Lex parsimoniae

                D 1 Reply Last reply Reply Quote 0
                • D
                  DBMandrake @serbus
                  last edited by DBMandrake

                  @serbus Hi,

                  Related, yes - they are seeing the same problem I was.

                  I don't agree with their conclusion that there is a "bug" in the Nagios plugin though.

                  The whole purpose of the plugin is to be run once every 5 minutes during a Nagios (or in my case LibreNMS) polling session to confirm whether the NTP server is responsive or not.

                  It is not a "real" ntp client, it just sends a static ntp client request and checks to see if an answer is received, it does not keep any internal state so would not know how to "back off" in response to a KOD packet.

                  If I turn KOD back on (which triggers the ntpd server to restart) the very first request from the check_ntp_time plugin is rejected, and all subsequent requests are as well, even if I leave it a long time between requests.

                  I would expect at least the first query to be allowed if the real cause is rate limiting, but every single request is rejected when KOD is enabled. (What is the actual value of the rate limit ? How many minutes per request per client ? I haven't seen it documented anywhere)

                  As a workaround one could use "Custom Access Restrictions" to create a custom configuration for the IP address of the LibreNMS/Nagios monitoring server where KOD is disabled to allow it to poll freely.

                  However in my case I have around 60 IP cameras that are each polling every 10 minutes (changing this is outside my control) and I want the ntp queries to always be answered, so I guess I just disable KOD and be happy that I found a solution, and hope that anyone else having the same issue finds my thread. (which is the real reason I posted about this as I already had a solution before posting)

                  S 1 Reply Last reply Reply Quote 0
                  • S
                    serbus @DBMandrake
                    last edited by

                    @DBMandrake

                    Hello!

                    I dont think the problem is that you are calling check_ntp_time too frequently. My understanding is that the code inside the check_ntp_time was making numerous, non-delayed queries to the ntp server, which is what triggered the kod detection.

                    It looks like a --delay option flag was added to the code that you can use the prevent the KoD.

                    https://nagios-plugins.org/doc/man/check_ntp_time.html

                    John

                    Lex parsimoniae

                    D 1 Reply Last reply Reply Quote 2
                    • stephenw10S
                      stephenw10 Netgate Administrator
                      last edited by

                      Did disabling KoD also affect the ntp updates at the cameras?

                      D 1 Reply Last reply Reply Quote 0
                      • D
                        DBMandrake @serbus
                        last edited by DBMandrake

                        @serbus If each invocation of check_ntp_time is making numerous queries with no delay (why ??) as you say, it causing a problem would make sense. It seems like pretty dumb default behaviour.

                        The delay option looks like it could be a workaround, the problem is without trial and error I don't know what timing would and wouldn't be considered acceptable to the KoD algorithm as I haven't seen this documented.

                        I think in my case I'll just keep KoD disabled as all clients are an internal network.

                        Edit: just checked and found the version of check_ntp_time on the system doesn't support the delay option. (Ubuntu 22.04.4 LTS, installed via APT)

                        1 Reply Last reply Reply Quote 0
                        • D
                          DBMandrake @stephenw10
                          last edited by

                          @stephenw10

                          Hi - hard to be sure, as there's not really any diagnostics or logging available on the camera UI's to test NTP, other than just setting the time to be wrong then trying to force an update, which I'm not keen to do manually on over 60 cameras...

                          The proof of the pudding will be if they start drifting out of time again, but that will take a while to find out.

                          I think in my specific use case of it only serving specific internal clients that disabling KoD is the best option.

                          1 Reply Last reply Reply Quote 1
                          • First post
                            Last post
                          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.