On 6/26/2012 4:28 PM, Wessel Nieboer wrote:
Op 26-6-2012 20:35, Brian Rak schreef:
On 6/26/2012 12:24 PM, Ask Bjørn Hansen wrote:
I wrote on a different list last year (and here a few years ago):
"After the 2008-12-31 leap second about 1 in 7 of the NTP servers
went bad by just around one second in the first hour after the leap
second[1]. Even 12 hours later about 2% of the servers were still
bad. I didn't write it down, but I randomly checked some of the bad
servers and I recall that they were using a seemingly random mix of
sources (CDMA signals, GPS directly, other NTP servers over the
internet etc)." Ask [1]
https://lists.ntp.org/pipermail/pool/2009-January/004623.html
_______________________________________________ pool mailing list
[email protected] http://lists.ntp.org/listinfo/pool
What are my options for configuring a leap second on a 4.2.4p8
server? It seems like if I wanted to use autokey at all I need to
setup authentication on all my clients.. which is not exactly
feasible. I've been trying to avoid having to build 4.2.6 from
source, but 4.2.4p8 is still the latest version shipping with CentOS.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool
Compiling from source should be considered a small task.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool
It would actually be quite time consuming, as it means rebuilding RPMs
for NTP for all our OS/architecture combinations. We don't just
./configure; make; make install on our machines.
_______________________________________________
pool mailing list
[email protected]
http://lists.ntp.org/listinfo/pool