Following nearly 20 years of contribution to the NTP pool,
NTS (Network Time Security) is now active across our entire pool.
Time synchronization is a critical component of any IT infrastructure. Until now, the NTP protocol transmitted time in plaintext and without authentication, exposing systems to potential attacks. With the activation of NTS on our infrastructure, your systems can now cryptographically verify that the time received actually comes from our servers.
NTS (Network Time Security), standardized by RFC 8915 in September 2020, represents a major evolution of the NTP protocol. Here is why now is the time to adopt this technology.
There are only about 60 to 70 public NTS servers worldwide, including 45-50 in Europe. For comparison, the European NTP pool has 3,735 servers — NTS infrastructure is therefore 100 times rarer.
In France, NTS coverage is particularly low. By enabling NTS on our pool, RDEM Systems helps fill this gap and offers a reliable local alternative.
With our 11 NTS servers, we become a significant contributor among NTS time providers.
Chrony with NTS enabled by default — a major inflection point for adoption.
The German metrology institute is dropping its paid authenticated NTP service in favor of free NTS.
Deployment of ntpd-rs (Rust) funded by ISRG/Prossimo for their critical infrastructure.
Funding the development of an NTS pool by the Trifecta Tech Foundation.
| Benefit | Impact |
|---|---|
| DNSSEC Validation | DNSSEC depends on accurate time to validate signatures. Manipulated time can compromise the entire DNS chain. |
| TLS/SSL Certificates | Incorrect time can cause acceptance of expired or not-yet-valid certificates, opening the door to attacks. |
| 2FA Authentication (TOTP) | One-time tokens (Google Authenticator, etc.) depend on time synchronized to +/- 30 seconds. Learn more → |
| Financial Transactions | Trading systems, payments, and auditing require reliable and tamper-proof timestamping. |
| Logs and Compliance | Compromised time invalidates audit logs, which is problematic for GDPR, PCI-DSS, SOC2. |
The NTP protocol, designed in the 1980s, includes no native security mechanism. NTP packets travel over UDP without encryption or authentication, exposing systems to several well-documented attack types:
NTS (Network Time Security) is defined by RFC 8915. The protocol operates in two phases:
Our entire NTP pool now supports NTS. You can use any of
these servers for secure synchronization. All TLDs are valid:
.com, .fr, .eu, .net, .org,
.be, .biz, .info.
ntp-pool.rdem-systems.com
which automatically distributes requests across our entire infrastructure.
Chrony is the recommended NTP client for using NTS. It is available on most modern Linux distributions and natively supports NTS since version 4.0.
Edit your /etc/chrony/chrony.conf (or /etc/chrony.conf) file:
# /etc/chrony/chrony.conf - NTS RDEM Systems Configuration
# NTS RDEM Systems servers (secured)
# You can mix TLDs: .com, .fr, .eu, .net, .org, .be, .biz, .info
server ntp-pool.rdem-systems.com iburst nts
server ntp-1.rdem-systems.fr iburst nts
server ntp-2.rdem-systems.eu iburst nts
server ntp-3.rdem-systems.net iburst nts
# Drift file
driftfile /var/lib/chrony/drift
# Allow significant updates at startup
makestep 1.0 3
# Enable real-time clock sync
rtcsync
# Logging
logdir /var/log/chrony
# Install Chrony (Debian/Ubuntu)
sudo apt update && sudo apt install chrony
# Or on RHEL/CentOS/Fedora
sudo dnf install chrony
# Restart the service
sudo systemctl restart chronyd
# Check the status
sudo systemctl status chronyd
After configuring Chrony with NTS, verify that authentication is working correctly:
sudo chronyc -N sources
You should see your sources with the N flag indicating that NTS is active:
MS Name/IP address Stratum Poll Reach LastRx Last sample
===============================================================================
^* ntp-pool.rdem-systems.c> 2 6 377 23 -145us[ -201us] +/- 12ms
^+ ntp-1.rdem-systems.com 2 6 377 24 +234us[ +178us] +/- 15ms
^+ ntp-2.rdem-systems.com 2 6 377 25 -89us[ -145us] +/- 14ms
sudo chronyc -N authdata
This command displays the NTS authentication details for each source:
Name/IP address Mode KeyID Type KLen Last Atmp NAK Cook CLen
=========================================================================
ntp-pool.rdem-systems.c> NTS 1 15 256 23m 0 0 8 100
ntp-1.rdem-systems.com NTS 1 15 256 24m 0 0 8 100
ntp-2.rdem-systems.com NTS 1 15 256 25m 0 0 8 100
No, the standard ntpd daemon does not support NTS. You must use
Chrony (recommended), NTPsec, or ntpd-rs (Rust) to benefit from NTS.
Windows W32Time does not support NTS either.
The impact is negligible. The TLS negotiation only occurs at startup and during cookie renewal (approximately every hour). Regular NTP exchanges add only ~100 bytes for authentication.
Yes, Chrony can simultaneously use NTS sources and standard NTP sources. However, for optimal security, prefer NTS sources.
By default, if NTS cannot be established, Chrony will not use the affected source. This is secure behavior: it is better not to synchronize than to synchronize without authentication.
Only 60 to 70 public NTS servers exist globally, including about 45-50 in Europe. The institutional leaders are Netnod (Sweden, 12+ servers), PTB (Germany, 4 servers), and SIDN Labs (Netherlands). France is underrepresented, which motivates our commitment.
The traditional pooling mechanism is incompatible with NTS because each server requires its own TLS certificate. A project funded by ICANN (2025-2027) is working on a solution, but for now, NTS servers must be configured individually.
Ubuntu 25.10+ will enable Chrony with NTS by default — a major turning point. RHEL/Fedora and SUSE document NTS configuration. Most modern Linux distributions allow easy NTS activation with Chrony.
Check the NTS compatibility of your server with the tester ntp-tester.eu/nts
Verify that your system is correctly synchronized with our infrastructure.
Test Now