A security review of three NTP implementations
From a security standpoint (and here at the CII we are security people), Chrony was the clear winner between these three NTP implementations. Chrony does not have all of the bells and whistles that ntpd does, and it doesn’t implement every single option listed in the NTP specification, but for the vast majority of users this will not matter. If all you need is an NTP client or server (with or without reference clock), which is all that most people need, then its security benefits most likely outweigh any missing features."
Posted Oct 1, 2017 23:15 UTC (Sun)
by cornelio (guest, #117499)
[Link] (4 responses)
Posted Oct 1, 2017 23:36 UTC (Sun)
by karkhaz (subscriber, #99844)
[Link] (2 responses)
Posted Oct 2, 2017 2:11 UTC (Mon)
by josh (subscriber, #17465)
[Link]
Posted Oct 12, 2017 21:16 UTC (Thu)
by jch (guest, #51929)
[Link]
Posted Oct 3, 2017 6:26 UTC (Tue)
by rsidd (subscriber, #2582)
[Link]
Posted Oct 1, 2017 23:36 UTC (Sun)
by zblaxell (subscriber, #26385)
[Link] (2 responses)
My Google-fu can't find a concise list. Anything worth the extra exposure?
Posted Oct 2, 2017 2:24 UTC (Mon)
by fest3er (guest, #60379)
[Link] (1 responses)
Posted Oct 2, 2017 4:48 UTC (Mon)
by zblaxell (subscriber, #26385)
[Link]
So TL;DR Chrony has no broadcast/multicast, Autokey, or symmetric ephemeral modes (and at least two of those you don't want anyway). There's different NTP clock driver architecture (clock drivers talk to the server through a socket instead of being built into the server). The query interface is different, both on the network (separate port for queries) and admin tools (but not difficult to adapt--I flipped a couple of servers since reading the parent article).
OTOH Chrony boasts better statistical filters (which compensate for the lack of a clustering algorithm?), better power-saving behavior, better DNS pool behavior, and better tolerance for assorted network problems compared to ntpd and openntpd.
Posted Oct 2, 2017 7:46 UTC (Mon)
by cyperpunks (subscriber, #39406)
[Link] (1 responses)
Posted Oct 2, 2017 15:58 UTC (Mon)
by zdzichu (subscriber, #17118)
[Link]
Posted Oct 2, 2017 15:15 UTC (Mon)
by SEJeff (guest, #51588)
[Link]
https://access.redhat.com/documentation/en-us/red_hat_ent...
Posted Oct 2, 2017 15:34 UTC (Mon)
by smurf (subscriber, #17840)
[Link]
This is one of the most well-commented and -assertion-sprinkled code bases I have seen lately. Exemplary.
Posted Oct 3, 2017 4:55 UTC (Tue)
by gerv (guest, #3376)
[Link]
Posted Oct 5, 2017 0:59 UTC (Thu)
by nkiesel (guest, #11748)
[Link]
Posted Oct 5, 2017 11:52 UTC (Thu)
by dskoll (subscriber, #1630)
[Link]
This was a very interesting article. I replaced the standard ntpd with chrony on a large number of machines. Not only was it easy to set up, it also seems to lock onto the time references faster than ntpd. Thanks for this!
Posted Oct 6, 2017 23:45 UTC (Fri)
by kjp (guest, #39639)
[Link] (1 responses)
Posted Oct 6, 2017 23:52 UTC (Fri)
by kjp (guest, #39639)
[Link]
Posted Jul 22, 2024 14:59 UTC (Mon)
by salewski (subscriber, #121521)
[Link]
"Securing Network Time"
The original article at:
https://www.coreinfrastructure.org/news/blogs/2017/09/sec...
is no longer available. The site redirects to a 404 at openssf.org ("Open Source Security Foundation"), and rummaging around the "Blogs & Resources" there, looks like their content only goes back to October 2020. I don't know if that site actually has any connection to the original 'coreinfrastructure.org' other than owning the domain name.
openntpd.org
openntpd.org
openntpd.org
openntpd.org
openntpd.org
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
A security review of three NTP implementations
original article url dead; providing link from wayback machine
Date published: 2017-09-27
https://web.archive.org/web/20171028123642/https://www.co...