Can you use a packet sniffer, like Wireshark, to find out how far the packets are going toward the non-responding NTPD?
-----Original Message----- From: questions [mailto:questions-bounces+elliott.ch=comcast....@lists.ntp.org] On Behalf Of A C Sent: Sunday, April 10, 2016 1:50 PM To: NTPD Questions List Subject: [ntp:questions] Restrict problems I'm trying to figure out why two servers with the same ntp version (4.2.6p5, that's what's in the repository) are behaving differently with respect to peer queries from other local subnet hosts. One server (A) is configured: [server list] restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1 restrict 10.0.0.0 mask 255.255.0.0 The other server (B) is configured exactly the same: [server list] restrict -4 default kod notrap nomodify nopeer noquery restrict -6 default kod notrap nomodify nopeer noquery restrict 127.0.0.1 restrict ::1 restrict 10.0.0.0 mask 255.255.0.0 I copied and pasted from each server just to make sure I didn't miss anything. Now, I can remotely query server A from another client on 10.0.0.0/16 using ntpq -pn <serverA>. It gives me the list of peers as expected. Doing the same to server B results in a timeout error. Neither machine has a firewall set up so I'm not sure what I've missed in configurations. _______________________________________________ questions mailing list questions@lists.ntp.org http://lists.ntp.org/listinfo/questions _______________________________________________ questions mailing list questions@lists.ntp.org http://lists.ntp.org/listinfo/questions