bk: 50e56a369EB_1wwFjcEl1G2hnDIMUQ
+* Cleanup to ntp.conf.def.
* Upgrade to autogen-5.17 and libopts-37.0.12.
(4.2.7p343) 2013/01/02 Released by Harlan Stenn <stenn@ntp.org>
* Update the copyright year.
.Pp
The rest of this page describes the configuration and control options.
The
-.Qq Notes on Configuring NTP and Setting up a NTP Subnet
+.Qq Notes on Configuring NTP and Setting up an NTP Subnet
page
(available as part of the HTML documentation
provided in
If verification fails,
Bob sends Cathy a thing called a crypto-NAK, which tells her
something broke.
-She can see the evidence using the ntpq program.
+She can see the evidence using the
+.Xr ntpq 1ntpqmdoc
+program.
.Pp
Denise has rolled her own host key and certificate.
She also uses one of the identity schemes as Bob.