I
              am trying to set up a NTS server suing Let's Encrypt
              certificate for a web server, but haven't been successful.
              Here are the steps I've taken:
            
              
                - Set up a
                  web server on the same machine as chrony.
- Set up
                  Let's Encrypt certificates using the certbot tool and
                  the web server is properly serving a test page via
                  HTTPS.
- In
                  chrony.conf have the following directives relating to
                  NTS:
                  - ntsservercert - set to point
                    to the certificate created by certbot for the web
                    server
- ntsserverkey - set to point to the
                      key created by certbot for the web server
- Chrony
                    is working just fine in all other respects.
- Firewall
                    is configured to allow traffic on port 4460 and 123
                    and routes all such traffic to the chrony server.
              
              I have not taken any other steps other than what's
                described above.
              
              
              I am testing the NTS server by using a different
                machine in a different location on a different public IP
                that's running chrony and pointing to the server with
                nts directive. I will refer to this as the client
                machine.
              
              
              The client machine does not appear to authenticate
                the server properly for some reason. Running authdata
                command in chronyc shows "NTS" in mode column and a
                small number in column Atmp. All other columns are zero.
              
              
              On the server machine, running serverstats
                command in chronyc shows the same number as the client
                machine in column Atmp, in row "NTS-KE connections
                accepted. This suggests that the server is receiving an
                NTS request. Authenticated NTP packets is zero however,
                suggesting that authentication on the client side
                failed.
              
              
              Also, not sure if it matters, but my certificate
                points to a sub-domain, which is the same sub-domain as
                I am using as the server name on the client side.
                However, when I run "sources" command on the client
                machine, the server domain name resolves to something
                like "dsl-1-2-3-4-tor.pr where 1-2-3-4 is the actual
                server IP address. Not sure why it resolves like that,
                but I am guessing my DNS provider is somehow using the
                tor network? Could this be the culprit?
              
              
              Any suggestions on what may be wrong, or how to
                diagnose the problem?
              
              
              All your suggestions are always very much
                appreciated, thank you!
              
              
              Sviatoslav