On 6/26/2012 4:28 PM, Wessel Nieboer wrote:
Op 26-6-2012 20:35, Brian Rak schreef:
On 6/26/2012 12:24 PM, Ask Bjørn Hansen wrote:
I wrote on a different list last year (and here a few years ago): "After the 2008-12-31 leap second about 1 in 7 of the NTP servers went bad by just around one second in the first hour after the leap second[1]. Even 12 hours later about 2% of the servers were still bad. I didn't write it down, but I randomly checked some of the bad servers and I recall that they were using a seemingly random mix of sources (CDMA signals, GPS directly, other NTP servers over the internet etc)." Ask [1] https://lists.ntp.org/pipermail/pool/2009-January/004623.html _______________________________________________ pool mailing list [email protected] http://lists.ntp.org/listinfo/pool

What are my options for configuring a leap second on a 4.2.4p8 server? It seems like if I wanted to use autokey at all I need to setup authentication on all my clients.. which is not exactly feasible. I've been trying to avoid having to build 4.2.6 from source, but 4.2.4p8 is still the latest version shipping with CentOS.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Compiling from source should be considered a small task.

_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

It would actually be quite time consuming, as it means rebuilding RPMs for NTP for all our OS/architecture combinations. We don't just ./configure; make; make install on our machines.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool

Reply via email to