A collection of Australian NTP servers
Each table contains the following information:
- Endpoint: the hostname (or IP address) and port number of the NTP server being queried
- IP Address: the IP address of the host
- Version: the NTP version of the NTP server
- Stratum: the reported stratum value of the NTP server
- Leap: the reported leap indictor of the NTP server
An endpoint may have zero or more IP address, version, stratum, and leap combinations. An endpoint with no entries indicates that a DNS record exists for the host, but that no NTP server exists or it was otherwise inaccessible by the Python script. For example, Aussie Broadband's NTP servers only respond to customers. You may find it useful to test these endpoints yourself for this reason, particularly if the subdomain name of the endpoint begins with ntp
, time
, or one of the other predefined names. Further details about the information above can be obtained here.
You should use the endpoint when configuring an NTP client or server. For example:
# /etc/ntpsec/ntp.conf
...
server tic.ntp.telstra.net iburst
-
If you are looking for the Australian Government's NTP servers, please be aware they are only available to registered users.
-
Some ISPs may drop NTP traffic if the outbound source port is port 123 (well known NTP port number) and restrict access to some predefined ISP-controlled NTP servers. You may be able to bypass this restriction by altering the source port. One method is to add the following iptables rule to your router.
iptables -t nat -I POSTROUTING -p udp -m udp --sport 123 -j MASQUERADE --to-ports 49152-65535