EN FR Home

NTP IPv6 Test
Dual-Stack Validator & AAAA Audit

Verify NTP reachability over IPv6 — with NIS 2 and ISO 27001 dual-stack evidence

Published 20 April 2026 · By Richard DEMONGEOT, RDEM Systems · Target audience: DevOps, network architects, CISOs validating IPv6 rollout against time-synchronisation requirements.

1. Why NTP over IPv6 matters in 2026

IPv6 rollout has crossed the majority threshold for major European ISPs (Orange, Proximus, Deutsche Telekom all above 60%). Internal networks that carry production IPv6 but fall back to IPv4 for NTP create two problems simultaneously:

Practical rule. If your workload runs on IPv6 for any other service, your NTP must also reach an authenticated source over IPv6. The audit cost of admitting otherwise is higher than the one-line configuration fix.

2. AAAA resolution: what the DNS returns

Before NTP can speak IPv6, the resolver must return an AAAA record. Check with dig:

$ dig AAAA ntp.rdem-systems.com +short
2a01:e0a:4bc:5110::1

$ dig AAAA time.cloudflare.com +short
2606:4700:f1::1
2606:4700:f1::123

$ dig AAAA time.nist.gov +short
2610:20:6f15:15::27

An empty response means the operator has not published an AAAA record — you must choose another source for dual-stack. time.ntsc.ac.cn, for example, is IPv4-only as of April 2026.

3. pool.ntp.org and IPv6 — the subzone trick

The project-wide zone pool.ntp.org returns mixed A and AAAA, weighted by the percentage of volunteer servers in each family. Because IPv4 servers outnumber IPv6 by roughly 3:1, a client querying pool.ntp.org often receives four A records and no AAAA — effectively IPv4-only behaviour.

The workaround is the statistical subzone structure:

ZoneAAAA probabilityRecommended for
0.pool.ntp.orgVery low (~5%)Legacy IPv4 clients
1.pool.ntp.orgLow (~10%)Mostly IPv4
2.pool.ntp.orgHigh (~70%)IPv6-preferred clients
3.pool.ntp.orgHigh (~70%)IPv6-preferred clients

Best practice for dual-stack chrony/ntpd configuration:

# Favour IPv6 where available
server 2.pool.ntp.org iburst
server 3.pool.ntp.org iburst
# Explicit dual-stack anchors (AAAA guaranteed)
server time.cloudflare.com iburst nts
server ntp.rdem-systems.com iburst nts

4. How to test IPv6 NTP (CLI and browser)

Browser-based

Use the Compliance Validator in Bridge Mode with an IPv6-formatted target ([2a01:e0a:4bc:5110::1] or the hostname on an IPv6-only egress network). The bridge relays the NTPv4 packet via your local Node.js process, so DNS resolution and routing reflect your workstation's real network stack.

Linux — forced v6 probe

$ ntpdate -q -6 ntp.rdem-systems.com
server 2a01:e0a:4bc:5110::1, stratum 1, offset +0.000412, delay 0.01912

$ sntp -6 ntp.rdem-systems.com
+0.000412 +/- 0.001243 ntp.rdem-systems.com 2a01:e0a:4bc:5110::1 s1 no-leap

chrony explicit-family configuration

# /etc/chrony/chrony.conf
# Force IPv6-only query
server ntp.rdem-systems.com iburst family ipv6
# Dual-stack with preference
pool 2.pool.ntp.org iburst

Windows — w32tm

> w32tm /monitor /computers:ntp.rdem-systems.com
ntp.rdem-systems.com[2a01:e0a:4bc:5110::1:123]:
    ICMP: 12ms delay
    NTP: -0.0002341s offset from local clock
    RefID: 'GNSS' [0x53534E47]
    Stratum: 1

5. v4 vs v6 offset comparison

Probe the same hostname on both families and compare. A well-operated dual-stack source shows near-identical offset and sub-5 ms RTD variance:

$ sntp -4 ntp.rdem-systems.com
+0.000398 +/- 0.001200 ntp.rdem-systems.com 51.159.173.61 s1 no-leap

$ sntp -6 ntp.rdem-systems.com
+0.000412 +/- 0.001243 ntp.rdem-systems.com 2a01:e0a:4bc:5110::1 s1 no-leap

# Offset delta: 0.014 ms  — within measurement noise, healthy
# RTD delta: 0.043 ms     — healthy
Red flags. An offset delta > 20 ms between v4 and v6 to the same hostname typically indicates: (1) asymmetric routing — one family traverses a tunnel, (2) different backend servers behind the same anycast address, (3) broken time-sync on one of the two dual-stack instances. Investigate before trusting the combined clock.

6. Reliable dual-stack NTP sources (April 2026)

SourceIPv4IPv6NTSStratum
ntp.rdem-systems.com1
time.cloudflare.com3 (anycast)
time.google.com1 (leap-smeared)
time.nist.gov1
ntp1.ptb.de1
nts.netnod.se1
2.pool.ntp.org✓ (70%)Variable

For audit-grade configurations, prefer three sources with full dual-stack + NTS: for example ntp.rdem-systems.com, time.cloudflare.com, nts.netnod.se.

Why we know this field. RDEM Systems operates its own IPv6 address space under AS206014, runs dual-stack NTP on every node, and participates in the public NTP Pool project with both A and AAAA records. The reference servers documented above — including our French NTP servers and the NTS-enabled endpoints — are the same infrastructure that backs this validator. Every claim on this page was first validated against our own production telemetry before being published.

7. NIS 2 / ISO 27001 dual-stack evidence

Auditors will ask: can the essential/important entity's time-sync continue operating if either the v4 or v6 path is degraded? The evidence pack:

  1. AAAA resolution log — output of dig AAAA on each configured source, dated, retained.
  2. Dual-family query log — chrony sources output showing both A and AAAA records for at least one common source.
  3. Single-family failover test — documented procedure that cuts v4 (or v6) at the firewall and confirms clock stays synchronised via the other family within 2 minutes.
  4. Change-management record — any modification to NTP configuration ticketed alongside the corresponding routing or firewall change.

Cross-reference: our NIS 2 NTP requirements page lists this under the 10-control checklist, and the full audit checklist expands the supply-chain diversification argument.

Need audit-ready evidence?

Use the Compliance Validator to probe your infrastructure on both IPv4 and IPv6 and export results for the audit file.

Run the Validator → NIS 2 Requirements

Not here for audit? Use the right tool: