Just checked that the iburst rate is one packet every 2 secs for a responding 
client , total 6 . 

16:45:00.115534 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:00.206980 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48
16:45:02.122616 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:02.295478 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48
16:45:04.115161 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:04.202371 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48
16:45:06.115260 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:06.202423 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48
16:45:08.115264 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:08.201688 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48
16:45:10.115066 IP 209.200.39.7.123 > 129.6.15.30.123: NTPv4, Client, length 48
16:45:10.238195 IP 129.6.15.30.123 > 209.200.39.7.123: NTPv4, Server, length 48

So NIST servers should not refuse access , and this one clearly doesn’t.

For a client that is stays in INIT.
Requests are sent at minpoll , which in my case is 16 secs.

16:23:21.428877 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:23:37.428912 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:23:53.428827 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:24:09.428838 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:24:25.428832 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:24:41.428875 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:24:57.428801 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48
16:25:13.428818 IP 209.200.39.7.123 > 128.138.140.44.123: NTPv4, Client, length 
48

 So my issue is not with iburst as I do not get ANY packets in response from 
this server but ntpdate does get a response????


> Le 2 août 2015 à 16:33, Charles Swiger <cswi...@mac.com> a écrit :
> 
> On Aug 2, 2015, at 2:31 AM, Mike Cook <michael.c...@sfr.fr> wrote:
>> Can anyone confirm that this is an issue?
>> 
>> I habitually put an burst directive in my ntp.conf server statements. ex:
>> 
>> server 129.6.15.30 noselect iburst minpoll 4 maxpoll 6  
>> server 128.138.140.44 noselect iburst minpoll 4 maxpoll 6  
>> server 98.175.203.200 noselect iburst minpoll 4 maxpoll 6  
>> 
>> But in the case of these NIST servers, sometimes they never get out of INIT 
>> state.
> 
> iburst isn't usually a problem, but minpoll 4 / maxpoll 6 would be
> considered abusive without prior arrangements.  minpoll 6 is the fastest
> rate you should query other NTP servers without explicit permission.
> 
> To be more specific, folks who implement per-client firewall rate rules
> tend to block clients who exceed ~100 packets per hour.
> 
> 
> The main point of iburst is to quickly get a downed NTP server back up
> and serving valid time.  That matters most for isolated stratum-2+
> servers; if you've already got S1 timesources available and multiple
> redundant NTP servers locally, using iburst is superfluous.
> 
> Sure, use iburst on one remote server entry if you want and/or against
> all of the other NTP peers on your local subnet, but it's not obviously
> helpful to use iburst everywhere.
> 
> Regards,
> -- 
> -Chuck

"Ceux qui sont prêts à abandonner une liberté essentielle pour obtenir une 
petite et provisoire sécurité, ne méritent ni liberté ni sécurité."
Benjimin Franklin
_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to