NTS not 'working', likely operator error

ntpsec at anastrophe.com ntpsec at anastrophe.com
Tue Apr 9 23:12:28 UTC 2024


On 4/9/2024 7:19 AM, Steven Sommars via users wrote:
> I've examined NTP filtering quite a bit. IPv4 is more filtered than 
> IPv6  See 
> https://weberblog.net/ntp-filtering-delay-blockage-in-the-internet/ for 
> an analysis from 2020.
> The NTP blocks can change over time.  From  recent scans I see Comcast 
> blocks port 123 for UDP size not equal to 56 (NTP payload is 48 bytes).
> I saw this from two residential locations, one near Chicago and one near 
> Denver.    For my local system this block was added on about 2023-02-14.
> Level 3 is a big offender.
>
> With some work you can use traceroute or similar tools such as mtr to 
> probe for blocks in the outgoing direction.
>
>     mtr -n -s 450 -u -P 123   IPv4_address
>
>     -s sets the payload size.  -P set the outgoing port number.
>
> CAUTION.   I've found argument parsing bugs in some traceroute and mtr 
> versions.    The above example works for mtr version 0.95 but doesn't 
> work for version 0.85
> I use tcpdump/wireshark to verify that outgoing probe packets have UDP 
> destination port set to 123 and that they have the expected size.
>
> -P 123      NTP (UDP port 123) size 450 is blocked in local ISP, can't 
> tell where
>                                   Packets Pings
>  Host                           Loss%   Snt   Last   Avg  Best  Wrst StDev
>  1. local_system                 0.0%     3    1.3   1.2 1.2   1.3   0.0
>  2. (waiting for reply)
>
> -P 122     UDP port 122 size 450 is not blocked
> Packets               Pings
>  Host                           Loss%   Snt   Last   Avg  Best  Wrst StDev
>  1. local_system                 0.0%    16    1.3   1.1 0.8   1.3   0.2
>  2. (waiting for reply)
>  3. (waiting for reply)
>  4. 12.242.117.29                0.0%    16   10.7   9.8 6.2  13.1   2.6
>  5. 192.205.37.42                0.0%    16    7.9   9.6 7.4  18.7   3.5
>  6. 171.75.8.101                 0.0%    16  151.9 154.2 151.4 164.3   3.5
>  7. 62.67.67.154                 0.0%    16  152.2 152.9 151.5 157.4   1.5
>  8. 188.1.144.134                0.0%    16  157.3 185.6 157.2 255.3  42.5
>  9. (waiting for reply)

Thanks for the reply and the info regarding use of mtr. I've done a bunch 
of tests today between my mailserver in AWS, my webserver in the Oracle 
cloud, and my timeserver here on comcast/xfinity - both directions, 
different packet sizes, watching tcpdump output on both sides, using mtr, 
netcat, etc.. When my timeserver sends more than 48 bytes to either cloud 
server over UDP port 123, they will reach the destination server, but the 
reply back will not reach my timeserver.

I set up both my mailserver and my webserver to both run NTS. No problem 
communicating between the two. So, comcast/xfinity blocks large UDP 
packets on port 123, as you described.

It appears that I can no longer provide NTS timeservice to the outside 
world. This sort of widespread blocking can only further hinder adoption 
of NTS.

-- 
Paul Theodoropoulos
www.anastrophe.com
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/users/attachments/20240409/43bd7dc1/attachment.htm>


More information about the users mailing list