On 12-02-2022 08:37, Hal Murray wrote:

Please try git head.  I fixed my test case.

Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: ntpd ntpsec-1.2.1: Starting
Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: Command line: /usr/sbin/ntpd -u ntp:ntp -x -N -p /var/run/ntpd.pid
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: precision = 0.908 usec (-20)
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: successfully locked into RAM
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: readconfig: parsing file: /etc/ntp.conf Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: reading /etc/ntp/keys
Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: added 0 keys
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: 'monitor' cannot be disabled while 'limited' is enabled
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: Using SO_TIMESTAMPNS(ns)
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 0 v6wildcard [::]:123 Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 1 v4wildcard 0.0.0.0:123 Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 2 lo 127.0.0.1:123 Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 3 eth0 192.168.10.70:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 4 lo [::1]:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listening on routing socket on fd #21 for interface updates Feb 12 12:17:10 plnksrf ntpd[148642]: SYNC: Found 15 servers, suggest minsane at least 3 Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: MRU 10922 entries, 13 hash bits, 65536 bytes Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: OpenSSL 1.1.1l FIPS 24 Aug 2021, 101010cf Feb 12 12:17:10 plnksrf ntpd[148642]: NTSc: Using system default root certificates. Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]: INIT: ntpd ntpsec-1.2.1: Starting Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]: INIT: Command line: /usr/sbin/ntpd -u ntp:ntp -x -N -p /var/run/ntpd.pid Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: DNS lookup of time.cloudflare.com:1234 took 0.023 sec Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: connecting to time.cloudflare.com:1234 => 162.159.200.123:1234 Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256) Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate subject name: /C=US/ST=California/L=San Francisco/O=Cloudflare, Inc./CN=time.cloudflare.com Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate issuer name: /C=US/O=DigiCert Inc/CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: read 750 bytes
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using port 123
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Got 7 cookies, length 100, aead=15. Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: NTS-KE req to time.cloudflare.com:1234 took 0.140 sec, OK Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: DNS lookup of ntpmon.dcs1.biz took 0.084 sec Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: connecting to ntpmon.dcs1.biz:4460 => 203.123.48.219:4460 Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connect_TCP_socket: connect failed: Connection refused Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: DNS lookup of pi4.rellim.com took 0.241 sec Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connecting to pi4.rellim.com:4460 => 204.17.205.24:4460 Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256) Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate subject name: /CN=pi4.rellim.com Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate issuer name: /C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104, aead=15. Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: NTS-KE req to pi4.rellim.com took 1.107 sec, OK Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: DNS lookup of ntp2.glypnod.com took 0.153 sec Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: connecting to ntp2.glypnod.com:4460 => 178.62.68.79:4460 Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, TLS_AES_256_GCM_SHA384 (256) Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate subject name: /CN=ntp2.glypnod.com Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate issuer name: /C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104, aead=15. Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: NTS-KE req to ntp2.glypnod.com took 0.273 sec, OK Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 1024 weeks, WNRO Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 0 weeks, WNRO
(cut)

The GPS really lost the date:

$GPRMC,111848,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*79
$GPGGA,111848,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*61

$GPRMC,111849,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*78
$GPGGA,111849,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*60
$GPRMC,111850,A,5150.2209,N,00457.3691,E,000.0,346.3,290602,000.6,E*72




Udo

_______________________________________________
devel mailing list
devel@ntpsec.org
https://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to