I have several IoT devices with hard-coded DNS and NTP addresses.
I used some firewall rules to redirect all those requests to my Omnia.
The Omnia is getting the time from several NTP servers and it is a NTP server itself for all the clients.
NTP requests are not signed or encrypted, I was able to redirect the client to use my NTP server very easily.
Is there a risk that someone may do the same with my Omnia? A man-in-the-middle NTP attack?
If the Omnia internal clock is changed to the wrong time, would DNSSEC and TLS stop working?
Is this mitigated by the RTC chip?
From your documentation
When cryptography is used, exact time may be of utmost importance. Without proper time and date, electronic signatures cannot be correctly verified because all certificates have limited validity. This is true for HTTPS certificates as well as for DNSSEC. This is why, unlike other routers, Omnia has an RTC chip with battery backup which ensures that even after loss of power, the date and time are properly preserved. This mitigates one particular type of security attacks.