This post is entirely repetitive of another very recent post of yours. Please do not shout with capitals and please do not post the same things repetitively. It just makes it less likely @Ask or other participants will wade through such a ridiculously long thread, and annoys the rest of us with the wasted time reading your duplicate post.
You - cannot help from abroad (and you hardly should). We should do that, so this thread may be used for coordination of people that are willing to un-sink a sunk ship, make some patches at the holes, drain water out and raise the sails with ‘yo-ho-ho, we did that!’
From the evidence gathered here, such as it all starting at one point in time, going from normal traffic to extreme overload of many .ru.pool.ntp.org servers at once, I’m more and more convinced the root of the problem is a DDoS targeting ru.pool.ntp.org and/or its subzones (1, 2, 3, 4).
Keep in mind that a DDoS means the IP addresses sourcing the floods are likely not belonging to the attacker, but are compromised devices (routers and/or hosts) that are under control the person(s) behind the likely-politically-motivated attack. If you are reporting abusive IP addresses to the responsible ISP (via lookup of the AS number of the IP) you should probably mention that the attack is part of a widespread DDoS so the ISP’s client is probably not an attacker, but has compromised device(s).
I’m far from a fan of Russia under Putin, though I have no problem with the Russian people, but I am opposed to vigilante tech warfare by anyone anywhere. Leave it to the combatants and their allies, both sides have extensive internet warfare capabilities which will operate strategically to have the most useful effect. Vigilante actions could well be counterproductive due to timing or other reasons. For example, Ukraine and their allies might want to throw off NTP service (either by shifting time or denying all pool service) timed to enable some other action to be more effective.
I parsed a log of 10M NTP packets gathered from my home in a few minutes.
It does not look as abuse. Packet rates are relatively high, but the addresses may be NAT of ISPs hiding thousands of clients under the hood.
A second or third or fourth CPU won’t make much difference with a single-threaded server. When the server sends, the same CPU goes down into to the kernel and does the network stack work to send the packet. When it receives, whichever CPU services the interrupt from the network interface does the network stack work and is likely to come back up into the server process to handle the packet. Yes, there are opportunities for more than one CPU to be involved such as the NTP server replying on one processor to a previous packet while another handles an interrupt from the network interface, but with the interrupt coalescing usually enabled in the network driver, a busy server won’t be intrerrupting on every packet. Much of the processing is limited to one or two "CPU"s (cores/hyperthreads) so the modern systems which usually have at least 4 cores can benefit from @mlichvar’s multithreaded NTP front end when under heavy load.
I think the real solution to the overloading is sadly down to playing whack-a-mole with compromised IP addresses or convincing the vigilante cyberwarriors their attack is misguided, unless @Ask makes changes to the monitoring to be much more liberal with keeping overloaded .ru.pool.ntp.org servers in the pool so the zone doesn’t collapse so easily under DDoS. That would not be trivial as he would need to add geolocation lookup to the monitoring code, and special-case the scoring for affected zones. It might be useful for other country zones like China and the Phillipines, too.
I doubt he would spend cycles on that type of work, though, as he has been working on a more general project to make the per-country zones behave like the global or continental zones to address the collapse issue and generally provide clients with a better server selection, and would probably focus on that work over a band-aid hack to certain country zones.
I do not mind if you want to discuss political stuff, but please open another (politically motivated) thread, and leave this thread for pure technical things.
Dave, I opened another thread, the topic is how to regulate the load of an NTP server? An NTP server should never receive load bigger, than his owner predefined. Not even if there is not enough capacity in the pool. If we make the theoretical experiment that everybody puts his/her server in ‘test only’ mode except one, even that single server should not receive more NTP requests. The pool code should scale well to that edge case, giving DNS answers containing no IP addresses.