blog/source/_posts/nts-openwrt.md

2.5 KiB

title excerpt date tags
Configuring NTS in OpenWRT Obtain time in an authenticated manner 2024-10-12
openwrt

Network Time Security (NTS) is a security extension to the Network Time Protocol (NTP) to provide integrity and authenticity using TLS, and other features. Despite the use of TLS, NTS does not provide confidentiality as the NTP data itself is not encrypted. Other security extension (unrelated to NTP) like DNSSEC also does not provide confidentiality because the DNS data is not encrypted. Even TLS itself is not fully encrypted because Client Hello is still sent in the clear, at least until Encrypted Client Hello is standardised.

Back to OpenWRT, first SSH into the device.

Disable sysntpd so that there is only one NTP client.

service sysntpd stop
service sysntpd disable

Install chrony-nts package, chrony package does not support NTS.

opkg update
opkg install chrony-nts

Disable NTP in chrony.

uci set chrony.@pool[0].disabled='1'
uci set chrony.@dhcp_ntp_server[0].disabled='1'

Add NTS servers, preferably at least two and they are geographically close.

uci set chrony.cloudflare='server'
uci set chrony.cloudflare.hostname='time.cloudflare.com'
uci set chrony.cloudflare.iburst='yes'
uci set chrony.cloudflare.nts='yes'
uci set chrony.netnod='server'
uci set chrony.netnod.hostname='nts.netnod.se'
uci set chrony.netnod.iburst='yes'
uci set chrony.netnod.nts='yes'

Commit the changes and restart the daemon.

uci commit chrony
service chronyd restart

Verify the config.

cat /etc/config/chrony

config pool
	option hostname '2.openwrt.pool.ntp.org'
	option maxpoll '12'
	option iburst 'yes'
  option disabled 'yes'

config dhcp_ntp_server
	option iburst 'yes'
	option disabled 'yes'

config server cloudflare
	option hostname 'time.cloudflare.com'
	option iburst 'yes'
	option nts 'yes'

config server netnod
	option hostname 'nts.netnod.se'
	option iburst 'yes'
	option nts 'yes'

config allow
	option interface 'lan'

config makestep
	option threshold '1.0'
	option limit '3'

config nts
	option rtccheck 'yes'
	option systemcerts 'yes'

Lastly, highly recommend to hardcode the IP address of the chosen NTP servers into "/etc/hosts", especially when using DNSSEC-validating DNS client, to avoid unresolvable NTS domains when the time is not correct.