OK, do you see any requests going out on port 123 with tcpdump when you restart ntpd?
Could you do that with -n and show an ifconfig output of your WAN interface and the netstat -rn output?
The "bad checksum" can be an artifact of tcpdump itself. But it might be worth a try to disable hardware offloading for that interface.Also what does ntpdate -q for these servers result in? Also no answer at all?And last - is this OPNsense a hosted service or is "Bahnhof" the company responsible for the OPNsense? If hosted, is it remotely possibly they are blocking NTP? It could be abused for amplification attacks and many providers used to do this.
So ntpdate works but ntpd doesn't? WTF?Ah ... one moment.Are you running ntpdate -q as root? Can you verify with tcpdump that it is also using port 123 as the source port? If it doesn't, then that might hint at your ISP or somebody else blocking port 123 for IPv6.Also, did you try disabling hardware offloading?