Can you use a packet sniffer, like Wireshark, to find out how far the
packets are going toward the non-responding NTPD?

-----Original Message-----
From: questions
[mailto:questions-bounces+elliott.ch=comcast....@lists.ntp.org] On Behalf Of
A C
Sent: Sunday, April 10, 2016 1:50 PM
To: NTPD Questions List
Subject: [ntp:questions] Restrict problems

I'm trying to figure out why two servers with the same ntp version (4.2.6p5,
that's what's in the repository) are behaving differently with respect to
peer queries from other local subnet hosts.

One server (A) is configured:
[server list]
restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default
kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1 restrict
10.0.0.0 mask 255.255.0.0

The other server (B) is configured exactly the same:
[server list]
restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default
kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1 restrict
10.0.0.0 mask 255.255.0.0

I copied and pasted from each server just to make sure I didn't miss
anything.

Now, I can remotely query server A from another client on 10.0.0.0/16 using
ntpq -pn <serverA>.  It gives me the list of peers as expected.

Doing the same to server B results in a timeout error.  Neither machine has
a firewall set up so I'm not sure what I've missed in configurations.
_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

_______________________________________________
questions mailing list
questions@lists.ntp.org
http://lists.ntp.org/listinfo/questions

Reply via email to