FYI the issues reported are related to the VPN link I am using to access the US NIST servers. If I deactivate openvpn then the issues are corrected . Re-activating it recreates the issues. I was intrigued why ntpdate was seeing the servers and it looks like it may be due to its use of a non root source port. There is possibly some firewall in the vpn link blocking root traffic. Anyway ntp is working as designed.
Regards, Mike > Le 2 août 2015 à 16:58, Charles Elliott <elliott...@comcast.net> a écrit : > > In your NIST server anomaly email, you are using an older version of ntpdate; > my output from ntpdate is much different from yours. > > As far as the refid for time-c.nist.gov goes, in your output it is different > in two places, neither of which is correct: > > refid [129.6.15.30], delay 0.11169, dispersion 0.00015 > > ntpq -pn on this system showed > 129.6.15.30 43.77.130.254 2 u 13 16 377 86.501 1.132 0.582 > > All that being said, it is a good catch; there is obviously something wrong. > However, with older versions of ntdpdate and possibly ntpd, there have been > so many changes it is hard to tell what is wrong, whether it is a programming > error or an NIST error. However, it appears that 43.77.130.254 is registered > to a university in Tokyo, Japan. Is some enterprising young Japanese lad > performing experiments, or is NTPD performing inverse IP address lookups > incorrectly again? > > I have achieved much better results from ntpd (currently offset=0.030818 > milliseconds and sys_jitter=0.014405 milliseconds) by selecting up to 9 NTP > servers that are physically close to me and are not heavily loaded. And I > avoid using the pool servers, period. Pool servers in the United States > apparently use computers not even the Salvation Army will give away to the > poor. In addition, in my experience, they are not well maintained. > > NTPD error is proportional to the distance between the client and server > machines. You have very little hope of accessing accurate time by using > servers that are thousands of miles away from you, and thousands of miles > from each other. Time-c.nist.gov is located in the American state of > Maryland, which on the east coast; access time for me is about 18 > milliseconds. India.colorado.edu is located slightly west of the middle of > the United States, and access time for me is 53 milliseconds. Right this > minute, they are both showing about the same time, about 1.7 milliseconds > apart, but ordinarily I would expect the difference to be greater than that. > In any case, my ntpd client almost never selects time-c.nist.gov because I > can access physically closer servers with less jitter. > > > Charles Elliott > > >> -----Original Message----- >> From: questions [mailto:questions- >> bounces+elliott.ch=comcast....@lists.ntp.org] On Behalf Of Mike Cook >> Sent: Sunday, August 2, 2015 5:32 AM >> To: Questions List >> Subject: [ntp:questions] iburst and NIST servers >> >> Hi, >> Can anyone confirm that this is an issue? >> >> I habitually put an burst directive in my ntp.conf server statements. >> ex: >> >> server 129.6.15.30 noselect iburst minpoll 4 maxpoll 6 >> server 128.138.140.44 noselect iburst minpoll 4 maxpoll 6 >> server 98.175.203.200 noselect iburst minpoll 4 maxpoll 6 >> >> But in the case of these NIST servers, sometimes they never get out of >> INIT state. >> >> # pool 0.europe.pool.ntp.org iburst >> mike@bb1:~$ ntpq -pn >> remote refid st t when poll reach delay offset >> jitter >> ======================================================================= >> ======= >> o127.127.22.0 .M12+. 0 l 4 16 377 0.000 0.003 >> 0.002 >> +192.168.1.23 .GPS. 1 u 1 16 377 0.473 -0.031 >> 0.011 >> 129.6.15.30 43.77.130.254 2 u 16 16 376 86.082 0.805 >> 0.312 >> 128.138.140.44 .INIT. 16 u - 64 0 0.000 0.000 >> 0.000 >> 98.175.203.200 .INIT. 16 u - 64 0 0.000 0.000 >> 0.000 >> *192.168.1.4 .PPS1. 1 u - 16 377 0.580 0.049 >> 0.018 >> +192.168.1.18 .Neo8. 1 u 2 16 377 0.437 0.019 >> 0.035 >> >> I see in <http://tf.nist.gov/tf-cgi/servers.cgi> the following gotcha >> >> All users should ensure that their software NEVER queries a server more >> frequently than once every 4 seconds. Systems that exceed this rate >> will be refused service. In extreme cases, systems that exceed this >> limit may be considered as attempting a denial-of-service attack. >> >> The refusal appears random as sometimes a server never leaves INIT, >> however if I restart ntpd it may be accepted. >> >> Could there be another explanation? >> >> Regards, >> Mike >> >> "Ceux qui sont prêts à abandonner une liberté essentielle pour obtenir >> une petite et provisoire sécurité, ne méritent ni liberté ni sécurité." >> Benjimin Franklin >> _______________________________________________ >> questions mailing list >> questions@lists.ntp.org >> http://lists.ntp.org/listinfo/questions "Ceux qui sont prêts à abandonner une liberté essentielle pour obtenir une petite et provisoire sécurité, ne méritent ni liberté ni sécurité." Benjimin Franklin _______________________________________________ questions mailing list questions@lists.ntp.org http://lists.ntp.org/listinfo/questions