Dag-Erling,
The monitor and rate semantics are further elaborated in the recent
documentation posted to the web page.
Dave
Dag-Erling Smørgrav wrote:
> "David L. Mills" <[EMAIL PROTECTED]> writes:
>
>>The rate violation is caught in the MRU list, which can be retrieved
>>using ntpdc and the mo
"David L. Mills" <[EMAIL PROTECTED]> writes:
> If you set up a test locally, include the
>
> restrict default limited kod
>
> line in the configuration file.
Yes, that's what I did, and it works beautifully. Thanks!
DES
--
Dag-Erling Smørgrav - [EMAIL PROTECTED]
___
"David L. Mills" <[EMAIL PROTECTED]> writes:
> The rate violation is caught in the MRU list, which can be retrieved
> using ntpdc and the monlist command. When the number of clients is
> small, the list can be retrieved over the net. When the number of
> clients is larte, like several hundred, ther
Dag-Erling,
The rate violation is caught in the MRU list, which can be retrieved
using ntpdc and the monlist command. When the number of clients is
small, the list can be retrieved over the net. When the number of
clients is larte, like several hundred, there are many UDP packets and
one or mo
Dag-Erling,
Well, there's a reason. In the past serveral days 15 rascals have been
punished for rate exceed, one of them continuously at 3 others at 11 and
13 s. The problem is that the rate limit of two KoDs per seconds is
itself exceeded and the packet is not sent. The system statistics show
"David L. Mills" <[EMAIL PROTECTED]> writes:
> These configurable features are in the current snapshot, so that can
> do the same things.
One question, what is the range of the "monitor" value on a "discard"
line in ntp.conf?
My understanding is that if "monitor" is e.g. 10%, it will only send ou
Dag-Erling Smørgrav <[EMAIL PROTECTED]> writes:
> "David L. Mills" <[EMAIL PROTECTED]> writes:
> > These configurable features are in the current snapshot, so that can
> > do the same things.
> I'll set one up locally (inside the firewall) and see if I have better
> luck with it than with rackety.
"David L. Mills" <[EMAIL PROTECTED]> writes:
> Yes. The rackety.udel.edu NTP server has KoD enabled and an average
> headway threshold of 16 s. If you send packets at less than 2-s
> headway or less tha 16-s average headway, you should get a KoD
> RATE. If you are not authenticated, pogo.udel.edu s
Dag-Erling,
Yes. The rackety.udel.edu NTP server has KoD enabled and an average
headway threshold of 16 s. If you send packets at less than 2-s headway
or less tha 16-s average headway, you should get a KoD RATE. If you are
not authenticated, pogo.udel.edu should spit KoD AUTH at you. But, note
Does anyone know of a server or piece of software I can use to test an
SNTP implementation - including its handling of KOD packets?
DES
--
Dag-Erling Smørgrav - [EMAIL PROTECTED]
___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/
10 matches
Mail list logo