Of course this is always doable. If the domain name of your small ISP is small-isp.ru then you can configure the clients you distribute with configuration option in the NTP service pointing to ntp.small-isp.ru and you can add the following DNS entry:
ntp.small-isp.ru. IN CNAME 2.eu.pool.ntp.org.
And it is very flexible as it is easy to change where the hardcoded name is pointing to. However, the domain small-isp.ru should always be reachable for the clients to get time synchronization.
Found this thread by googling. Iām one of those few Russian NTP servers left, and I must admit that Iām having trouble keeping the server up because of the load exceeding my capacity. Iāve been a part of the project for over a decade, and never experienced any issues until recently.
It all began in October, with some mysterious random Internet outages every few hours each taking usually up to ten minutes. I blamed my ISP at first, until their technician told me that during those outages my inbound traffic was maxing out my 100Mbps bandwidth, so their shaper automatically throttled my traffic. The quick research indicated that it was NTP traffic. Normally not more than a few thousand requests per minute, it peaked to half a million and more every once in a while, completely congesting my traffic.
I took my server into monitoring mode for a day, and the situation gradually recovered. However, switching back to operational mode, even with the smallest bandwidth 512Kbit, almost immediately brought the the outages back. Iām still trying to figure out a solution, but it seems like a we are dealing with a snowball effect, when the excessive load makes more and more servers quit, thus even further increasing the load on the remaining ones.
I very much doubt that is an issue today. ntpdās stable release removed the massive multipler reflector functionality (ntpdc -c monlist) in 2014 or 2015. It was removed from the test releases (ntp-dev) in 2009 or 2010. The reflection DDoS wave in 2015 caused many firewalls to reject all NTP traffic, or all traffic except client (mode 3) and server (mode 4), when all that was needed was to block all ntpdc (mode 7) or specifically mode 7 monlist requests (a particular hex operation code value at the correct offset of the binary mode 7 protocol). Many of those blocks were never removed, causing ongoing carnage for NTP clients and servers for years.
Itās sad the ntp.org release management chose to go 5 years between stable releases despite the potential for DDoS around monlist being understood. I still have major problems with the way release management is being handled, but this isnāt the place to gripe about that.
As is ntpd, as I pointed out to here recently including a link to the relevant documentation and an example discard minimum directive for ntp.conf. Search the forum for ādiscard minimumā if you have forgotten. Otherwise, Iām left with the impression youāre intentionally spreading misinformation about ntpd in a misguided effort to promote Chrony. Chrony has lots of other differences with ntpd, thereās no need to stretch the truth to find reasons one might choose it, such as the fact itās the default in popular Linux distributions.
On the ntpd server, as Iāve also previously pointed out here recently, one can use:
$ ntpq -c "mrulist sort=avgint" | less
The first entries are the ones hitting the server most frequently. There are knobs available via ntp.conf to configure the size of the Most Recently Used list ntpd keeps to enforce rate limiting. This ntpq query displays that list. Without the sort parameter, the list is most recent first.
This is bullshit, as well as being rude. You claimed ntpd didnāt have a capability and noted you could be wrong. I pointed out a similar capability (not logging, but querying recent). Suggesting I was wrong to respond is just disrespectful of the intelligence of every reader here, and a sign of why I claim your posts can be very similar to trolling.
This is repetitive, youāve already stated that and I didnāt contradict you in my reply. Do you just like to make other people read your repetitive comments more than once?
I wouldnāt expect you to, given you run Chrony. If you ran that command on a ntpd host, or pointing to one that allows remote ntpq queries by tacking on its DNS or IP at the end of the command, youād have seen its list of most active recent clients.
Repetitive. We all have heard you sing Chronyās praises and (often misleadingly) run down ntpd before.
Iām not sure your opinion on software you donāt use carries much weight. Itās old, as the original NTP server and client, but development is ongoing, though it did a break from 2019 until 2023 when I became active in its development again after demands on my time were reduced.
You should be able to see if in fact cloudflare NTP servers are down in Russia with a few checks.
First off, does nslookup time.cloudflare.com. return any IP addresses for you?
If you do get IP addresses, try using sntp or ntpdate from the NTP distribution to try using time.cloudflare.com:
ntpdate -d time.cloudflare.com
or add them to your NTP serverās configuration with:
server time.cloudflare.com iburst
and then take a look at its status and see if itās serving you time.
That would be a major help in determining if the problem is some sort of flooding due to abuse/bad client or if itās due to Cloudflareās Russian NTP service going down shifting a much higher burden on the rest of the poolās Russian servers.
The stated policy is for vendors of equipment/software using the pool hardcoded or defaulting to using the pool to obtain a vendor zone from the pool, like ubuntu.pool.ntp.org. Yes, there are many who ignore this, and yes, people have complained about waiting ages for vendor zones to be approved, and I donāt know how much the latter is responsible for the former, but itās still the advice Iād recommend as it leaves open the possibility to handle a vendor zone differently if it turns out their clients are misbehaving somehow.
Unfortunately that rules out using continent zones as @PoolMUC is suggesting is wise with the current pool DNS implementation. Or at least I couldnāt figure out how to query a vendor+continent zone, perhaps someone affiliated with the pool will speak up here.
No replies. It doesnāt need to be @kkursor, but would someone in Russia please check if Cloudflare servers are working from within Russia? They are included in *.ru.pool.ntp.org but keep in mind with their IP addresses being anycast from many different data centers, just because monitors outside Russia say itās working and it is in the zone doesnāt mean itās working for clients inside Russia. My hunch is it does indeed work inside Russia and thatās letting clients using *.ru.pool.ntp.org continue to work despite what I suspect is a malicious flood of NTP queries to that zone, but it would be groovy to know one way or the other.
If you have access to ntpdate, try:
nslookup time.cloudflare.com.
Does the response include the IP addresses below? Then please try:
The output should make it clear if youāre getting responses and how close they suggest your system clock is.
If you donāt have access to ntpdate, you can test by adding those addresses to your NTP server configuration and looking at the status after a few minutes to see if youāre getting useful responses.