LWN: Comments on "A security review of three NTP implementations" https://lwn.net/Articles/735211/ This is a special feed containing comments posted to the individual LWN article titled "A security review of three NTP implementations". en-us Sun, 14 Sep 2025 09:26:46 +0000 Sun, 14 Sep 2025 09:26:46 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net original article url dead; providing link from wayback machine https://lwn.net/Articles/982858/ https://lwn.net/Articles/982858/ salewski <div class="FormattedComment"> Here's a link to the original article in the Internet Archive's "Wayback Machine":<br> <p> "Securing Network Time"<br> Date published: 2017-09-27<br> <a href="https://web.archive.org/web/20171028123642/https://www.coreinfrastructure.org/news/blogs/2017/09/securing-network-time">https://web.archive.org/web/20171028123642/https://www.co...</a><br> <p> The original article at:<br> <p> <a href="https://www.coreinfrastructure.org/news/blogs/2017/09/securing-network-time">https://www.coreinfrastructure.org/news/blogs/2017/09/sec...</a><br> <p> is no longer available. The site redirects to a 404 at openssf.org ("Open Source Security Foundation"), and rummaging around the "Blogs &amp; Resources" there, looks like their content only goes back to October 2020. I don't know if that site actually has any connection to the original 'coreinfrastructure.org' other than owning the domain name.<br> <p> </div> Mon, 22 Jul 2024 14:59:20 +0000 openntpd.org https://lwn.net/Articles/736227/ https://lwn.net/Articles/736227/ jch <div class="FormattedComment"> Last time I checked, OpenNTPd violated the protocol in ways that may cause synchronisation loops (which might in principle lead to desynchronisation of the whole network, not just of the machine running OpenNTPd). I recommend you avoid it.<br> <p> </div> Thu, 12 Oct 2017 21:16:05 +0000 A security review of three NTP implementations https://lwn.net/Articles/735705/ https://lwn.net/Articles/735705/ kjp <div class="FormattedComment"> nevermind, it appears "smear" isn't what I want, it's "leapsecmode slew" on a client, so time doesn't jump backward. Does that actually work for a normal client, e.g. in ec2? <br> </div> Fri, 06 Oct 2017 23:52:27 +0000 A security review of three NTP implementations https://lwn.net/Articles/735704/ https://lwn.net/Articles/735704/ kjp <div class="FormattedComment"> So still no way for us people "just running clients" to have smeared leap seconds? :(<br> </div> Fri, 06 Oct 2017 23:45:56 +0000 A security review of three NTP implementations https://lwn.net/Articles/735537/ https://lwn.net/Articles/735537/ dskoll <p>This was a very interesting article. I replaced the standard ntpd with chrony on a large number of machines. Not only was it easy to set up, it also seems to lock onto the time references faster than ntpd. Thanks for this! Thu, 05 Oct 2017 11:52:10 +0000 A security review of three NTP implementations https://lwn.net/Articles/735508/ https://lwn.net/Articles/735508/ nkiesel <div class="FormattedComment"> Of course we also have systemd-timesyncd these days which promises even simpler "keep my local clock in sync".<br> </div> Thu, 05 Oct 2017 00:59:26 +0000 openntpd.org https://lwn.net/Articles/735292/ https://lwn.net/Articles/735292/ rsidd <div class="FormattedComment"> Just a nitpick -- OpenNTPD is not a fork, it's a reimplementation like chrony. <br> </div> Tue, 03 Oct 2017 06:26:23 +0000 A security review of three NTP implementations https://lwn.net/Articles/735290/ https://lwn.net/Articles/735290/ gerv <div class="FormattedComment"> Just to set the record straight: Mozilla's SOS Fund commissioned and paid for the audits of ntp and ntpsec. We also ran the audit for chrony, although it was paid for by CII.<br> </div> Tue, 03 Oct 2017 04:55:42 +0000 A security review of three NTP implementations https://lwn.net/Articles/735273/ https://lwn.net/Articles/735273/ zdzichu <div class="FormattedComment"> Chrony supports KVM's paravirtualized PTP clock, which gives pretty good accuracy.<br> </div> Mon, 02 Oct 2017 15:58:44 +0000 A security review of three NTP implementations https://lwn.net/Articles/735238/ https://lwn.net/Articles/735238/ smurf <div class="FormattedComment"> Just checked out the Chrony sources and had a look.<br> <p> This is one of the most well-commented and -assertion-sprinkled code bases I have seen lately. Exemplary.<br> </div> Mon, 02 Oct 2017 15:34:26 +0000 A security review of three NTP implementations https://lwn.net/Articles/735237/ https://lwn.net/Articles/735237/ SEJeff <div class="FormattedComment"> The most obvious reasons chrony is more secure is its apparent simplicity compared to the legacy mess that is ntpd riddled with ancient landmines and old coding standards. It is one of the reasons they mention security reasons to using chrony in the RHEL7 documentation:<br> <p> <a href="https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/system_administrators_guide/ch-configuring_ntp_using_the_chrony_suite">https://access.redhat.com/documentation/en-us/red_hat_ent...</a><br> </div> Mon, 02 Oct 2017 15:15:58 +0000 A security review of three NTP implementations https://lwn.net/Articles/735222/ https://lwn.net/Articles/735222/ cyperpunks <div class="FormattedComment"> Chrony also seems to work way better than ntpd in VMs (for some reason).<br> </div> Mon, 02 Oct 2017 07:46:01 +0000 A security review of three NTP implementations https://lwn.net/Articles/735220/ https://lwn.net/Articles/735220/ zblaxell <div class="FormattedComment"> Thanks! I somehow missed that in a forest of not-quite-relevant links.<br> <p> So TL;DR Chrony has no broadcast/multicast, Autokey, or symmetric ephemeral modes (and at least two of those you don't want anyway). There's different NTP clock driver architecture (clock drivers talk to the server through a socket instead of being built into the server). The query interface is different, both on the network (separate port for queries) and admin tools (but not difficult to adapt--I flipped a couple of servers since reading the parent article).<br> <p> OTOH Chrony boasts better statistical filters (which compensate for the lack of a clustering algorithm?), better power-saving behavior, better DNS pool behavior, and better tolerance for assorted network problems compared to ntpd and openntpd.<br> </div> Mon, 02 Oct 2017 04:48:46 +0000 A security review of three NTP implementations https://lwn.net/Articles/735219/ https://lwn.net/Articles/735219/ fest3er <div class="FormattedComment"> <a rel="nofollow" href="https://chrony.tuxfamily.org/comparison.html">https://chrony.tuxfamily.org/comparison.html</a><br> </div> Mon, 02 Oct 2017 02:24:50 +0000 openntpd.org https://lwn.net/Articles/735218/ https://lwn.net/Articles/735218/ josh <div class="FormattedComment"> Likewise. I don't know about chrony, and this report is encouraging, but I personally used to use OpenNTPD myself, back when I ran a full NTP daemon and not just an SNTP client.<br> </div> Mon, 02 Oct 2017 02:11:35 +0000 openntpd.org https://lwn.net/Articles/735215/ https://lwn.net/Articles/735215/ karkhaz <div class="FormattedComment"> Yes, when I saw the headline I was really hoping that the third implementation to be tested would be OpenNTPD. They're using the same development model as OpenSSH (whereby main development is targeted at OpenBSD, and a different developer patches it to create the 'portable' version), which comes with all of the pros and cons that this model entails. I've been using OpenNTPD on my (Linux) boxes, very happy with it.<br> </div> Sun, 01 Oct 2017 23:36:37 +0000 A security review of three NTP implementations https://lwn.net/Articles/735213/ https://lwn.net/Articles/735213/ zblaxell <div class="FormattedComment"> What are these "not every single option in the NTP specification" options that distinguish NTP servers? Autokey? Obscure MAC formats? Missing data fields? Rate tracking and request limiting?<br> <p> My Google-fu can't find a concise list. Anything worth the extra exposure?<br> </div> Sun, 01 Oct 2017 23:36:19 +0000 openntpd.org https://lwn.net/Articles/735214/ https://lwn.net/Articles/735214/ cornelio <div class="FormattedComment"> FWIW, OpenBSD has its own fork.<br> </div> Sun, 01 Oct 2017 23:15:24 +0000