From: Harlan Stenn Date: Tue, 27 Feb 2018 07:54:59 +0000 (+0000) Subject: p11 prep X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=269685b25a50faa55e8887b9251cc5a53de85611;p=thirdparty%2Fntp.git p11 prep bk: 5a950ed3tufqqE_1dUUWNcI8MAvpwA --- diff --git a/ntpd/invoke-ntp.conf.texi b/ntpd/invoke-ntp.conf.texi index 6aa0a2a62..b26b05544 100644 --- a/ntpd/invoke-ntp.conf.texi +++ b/ntpd/invoke-ntp.conf.texi @@ -6,7 +6,7 @@ # # EDIT THIS FILE WITH CAUTION (invoke-ntp.conf.texi) # -# It has been AutoGen-ed January 22, 2018 at 11:49:10 AM by AutoGen 5.18.5 +# It has been AutoGen-ed February 27, 2018 at 07:25:51 AM by AutoGen 5.18.5 # From the definitions ntp.conf.def # and the template file agtexi-file.tpl @end ignore @@ -1959,7 +1959,7 @@ there is clear benefit to having the clients notice this change as soon as possible. Attacks such as replay attacks can happen, however, and even though there are a number of protections built in to -broadcast mode, attempts to perform a replay attack are possible. +broadcast mode, attempts to perform a replay attack are possible. This value defaults to 0, but can be changed to any number of poll intervals between 0 and 4. @end table @@ -2545,14 +2545,14 @@ The directive controls which network addresses @code{ntpd(1ntpdmdoc)} opens, and whether input is dropped without processing. -The first parameter determines the aciton for addresses +The first parameter determines the action for addresses which match the second parameter. The second parameter specifies a class of addresses, or a specific interface name, or an address. In the address case, @kbd{prefixlen} -determines how many bits must match for this rule to apply. +determines how many bits must match for this rule to apply. @code{ignore} prevents opening matching addresses, @code{drop} diff --git a/ntpd/invoke-ntp.keys.texi b/ntpd/invoke-ntp.keys.texi index 509864dca..8ad9d67a9 100644 --- a/ntpd/invoke-ntp.keys.texi +++ b/ntpd/invoke-ntp.keys.texi @@ -6,7 +6,7 @@ # # EDIT THIS FILE WITH CAUTION (invoke-ntp.keys.texi) # -# It has been AutoGen-ed January 11, 2018 at 12:04:08 PM by AutoGen 5.18.5 +# It has been AutoGen-ed February 27, 2018 at 07:25:53 AM by AutoGen 5.18.5 # From the definitions ntp.keys.def # and the template file agtexi-file.tpl @end ignore diff --git a/ntpd/invoke-ntpd.texi b/ntpd/invoke-ntpd.texi index ff27bc498..057ac2bd9 100644 --- a/ntpd/invoke-ntpd.texi +++ b/ntpd/invoke-ntpd.texi @@ -6,7 +6,7 @@ # # EDIT THIS FILE WITH CAUTION (invoke-ntpd.texi) # -# It has been AutoGen-ed May 19, 2017 at 12:33:00 PM by AutoGen 5.18.5 +# It has been AutoGen-ed February 27, 2018 at 07:25:54 AM by AutoGen 5.18.5 # From the definitions ntpd-opts.def # and the template file agtexi-cmd.tpl @end ignore diff --git a/ntpd/ntp.conf.5man b/ntpd/ntp.conf.5man index 6d8233ec9..1439144f8 100644 --- a/ntpd/ntp.conf.5man +++ b/ntpd/ntp.conf.5man @@ -10,11 +10,11 @@ .ds B-Font B .ds I-Font I .ds R-Font R -.TH ntp.conf 5man "22 Jan 2018" "4.2.8p10" "File Formats" +.TH ntp.conf 5man "27 Feb 2018" "4.2.8p10" "File Formats" .\" .\" EDIT THIS FILE WITH CAUTION (in-mem file) .\" -.\" It has been AutoGen-ed January 22, 2018 at 11:49:11 AM by AutoGen 5.18.5 +.\" It has been AutoGen-ed February 27, 2018 at 07:25:55 AM by AutoGen 5.18.5 .\" From the definitions ntp.conf.def .\" and the template file agman-cmd.tpl .SH NAME @@ -2208,7 +2208,7 @@ there is clear benefit to having the clients notice this change as soon as possible. Attacks such as replay attacks can happen, however, and even though there are a number of protections built in to -broadcast mode, attempts to perform a replay attack are possible. +broadcast mode, attempts to perform a replay attack are possible. This value defaults to 0, but can be changed to any number of poll intervals between 0 and 4. .PP @@ -2843,14 +2843,14 @@ The directive controls which network addresses \fCntpd\f[]\fR(1ntpdmdoc)\f[] opens, and whether input is dropped without processing. -The first parameter determines the aciton for addresses +The first parameter determines the action for addresses which match the second parameter. The second parameter specifies a class of addresses, or a specific interface name, or an address. In the address case, \f\*[I-Font]prefixlen\f[] -determines how many bits must match for this rule to apply. +determines how many bits must match for this rule to apply. \f\*[B-Font]ignore\f[] prevents opening matching addresses, \f\*[B-Font]drop\f[] diff --git a/ntpd/ntp.conf.5mdoc b/ntpd/ntp.conf.5mdoc index c779405fa..bb7705061 100644 --- a/ntpd/ntp.conf.5mdoc +++ b/ntpd/ntp.conf.5mdoc @@ -1,9 +1,9 @@ -.Dd January 22 2018 +.Dd February 27 2018 .Dt NTP_CONF 5mdoc File Formats .Os .\" EDIT THIS FILE WITH CAUTION (ntp.mdoc) .\" -.\" It has been AutoGen-ed January 22, 2018 at 11:49:08 AM by AutoGen 5.18.5 +.\" It has been AutoGen-ed February 27, 2018 at 07:25:45 AM by AutoGen 5.18.5 .\" From the definitions ntp.conf.def .\" and the template file agmdoc-cmd.tpl .Sh NAME @@ -2034,7 +2034,7 @@ there is clear benefit to having the clients notice this change as soon as possible. Attacks such as replay attacks can happen, however, and even though there are a number of protections built in to -broadcast mode, attempts to perform a replay attack are possible. +broadcast mode, attempts to perform a replay attack are possible. This value defaults to 0, but can be changed to any number of poll intervals between 0 and 4. .El @@ -2677,14 +2677,14 @@ The directive controls which network addresses .Xr ntpd 1ntpdmdoc opens, and whether input is dropped without processing. -The first parameter determines the aciton for addresses +The first parameter determines the action for addresses which match the second parameter. The second parameter specifies a class of addresses, or a specific interface name, or an address. In the address case, .Ar prefixlen -determines how many bits must match for this rule to apply. +determines how many bits must match for this rule to apply. .Cm ignore prevents opening matching addresses, .Cm drop diff --git a/ntpd/ntp.conf.html b/ntpd/ntp.conf.html index 77173587b..a9da7c83e 100644 --- a/ntpd/ntp.conf.html +++ b/ntpd/ntp.conf.html @@ -37,7 +37,7 @@ Up: (dir)

This document applies to version 4.2.8p10 of ntp.conf. -

+

Short Contents

    NTP's Configuration File User Manual @@ -1471,7 +1471,7 @@ The monitor subcommand specifies the probability of discard for packets that overflow the rate-control window. -
    restrict address [mask mask] [flag ...]
    The +
    restrict address [mask mask] [ippeerlimit int] [flag ...]
    The address argument expressed in dotted-quad form is the address of a host or network. @@ -1494,6 +1494,15 @@ Note that text string default, with no mask option, may be used to indicate the default entry. +The +ippeerlimit +directive limits the number of peer requests for each IP to +int, +where a value of -1 means "unlimited", the current default. +A value of 0 means "none". +There would usually be at most 1 peering request per IP, +but if the remote peering requests are behind a proxy +there could well be more than 1 per IP. In the current implementation, flag always @@ -1540,6 +1549,17 @@ basis, with later trap requestors being denied service. This flag modifies the assignment algorithm by allowing low priority traps to be overridden by later requests for normal priority traps. +
    noepeer
    Deny ephemeral peer requests, +even if they come from an authenticated source. +Note that the ability to use a symmetric key for authentication may be restricted to +one or more IPs or subnets via the third field of the +ntp.keys +file. +This restriction is not enabled by default, +to maintain backward compatability. +Expect +noepeer +to become the default in ntp-4.4.
    nomodify
    Deny ntpq(1ntpqmdoc) and @@ -1567,11 +1587,10 @@ directive and also want to use by default, you'll want a restrict source ... line as well that does -
    not
    include the +not +include the nopeer directive. -
    noepeer
    Deny packets that would mobilize an ephemeral peering association, -even if authenticated.
    noserve
    Deny all packets except ntpq(1ntpqmdoc) and @@ -1948,11 +1967,12 @@ Attacks such as replay attacks can happen, however, and even though there are a number of protections built in to broadcast mode, attempts to perform a replay attack are possible. This value defaults to 0, but can be changed -to any number of poll intervals between 0 and 4. +to any number of poll intervals between 0 and 4. +
    Manycast Options
    -
    +
    tos [ceiling ceiling | cohort { 0 | 1 } | floor floor | minclock minclock | minsane minsane]
    This command affects the clock selection and clustering algorithms. It can be used to select the quality and @@ -1960,7 +1980,7 @@ quantity of peers used to synchronize the system clock and is most useful in manycast mode. The variables operate as follows: -
    +
    ceiling ceiling
    Peers with strata above ceiling will be discarded if there are at least @@ -2002,14 +2022,14 @@ Byzantine agreement, should be at least 4 in order to detect and discard a single falseticker.
    -
    ttl hop ...
    This command specifies a list of TTL values in increasing +
    ttl hop ...
    This command specifies a list of TTL values in increasing order, up to 8 values can be specified. In manycast mode these values are used in turn in an expanding-ring search. The default is eight multiples of 32 starting at 31.
    -
    +


    @@ -2018,7 +2038,7 @@ multiples of 32 starting at 31.

    Reference Clock Support

    -

    The NTP Version 4 daemon supports some three dozen different radio, +

    The NTP Version 4 daemon supports some three dozen different radio, satellite and modem reference clocks plus a special pseudo-clock used for backup or when no other clock source is available. Detailed descriptions of individual device drivers and options can @@ -2055,7 +2075,7 @@ page provided in /usr/share/doc/ntp). -

    A reference clock will generally (though not always) be a radio +

    A reference clock will generally (though not always) be a radio timecode receiver which is synchronized to a source of standard time such as the services offered by the NRC in Canada and NIST and USNO in the US. @@ -2071,7 +2091,7 @@ or the hardware port has not been appropriately configured results in a scalding remark to the system log file, but is otherwise non hazardous. -

    For the purposes of configuration, +

    For the purposes of configuration, ntpd(1ntpdmdoc) treats reference clocks in a manner analogous to normal NTP peers as much @@ -2092,7 +2112,7 @@ While it may seem overkill, it is in fact sometimes useful to configure multiple reference clocks of the same type, in which case the unit numbers must be unique. -

    The +

    The server command is used to configure a reference clock, where the @@ -2130,7 +2150,7 @@ meaning only for selected clock drivers. See the individual clock driver document pages for additional information. -

    The +

    The fudge command is used to provide additional information for individual clock drivers and normally follows @@ -2152,7 +2172,7 @@ in the fudge command as well. -

    The stratum number of a reference clock is by default zero. +

    The stratum number of a reference clock is by default zero. Since the ntpd(1ntpdmdoc) daemon adds one to the stratum of each @@ -2175,11 +2195,11 @@ these options apply to all clock drivers.

    Reference Clock Commands
    -
    +
    server 127.127.t.u [prefer] [mode int] [minpoll int] [maxpoll int]
    This command can be used to configure reference clocks in special ways. The options are interpreted as follows: -
    +
    prefer
    Marks the reference clock as preferred. All other things being equal, this host will be chosen for synchronization among a set of @@ -2212,7 +2232,7 @@ defaults to 10 (17.1 m) and defaults to 14 (4.5 h). The allowable range is 4 (16 s) to 17 (36.4 h) inclusive.
    -
    fudge 127.127.t.u [time1 sec] [time2 sec] [stratum int] [refid string] [mode int] [flag1 0 | 1] [flag2 0 | 1] [flag3 0 | 1] [flag4 0 | 1]
    This command can be used to configure reference clocks in +
    fudge 127.127.t.u [time1 sec] [time2 sec] [stratum int] [refid string] [mode int] [flag1 0 | 1] [flag2 0 | 1] [flag3 0 | 1] [flag4 0 | 1]
    This command can be used to configure reference clocks in special ways. It must immediately follow the server @@ -2223,7 +2243,7 @@ is possible at run time using the program. The options are interpreted as follows: -
    +
    time1 sec
    Specifies a constant to be added to the time offset produced by the driver, a fixed-point decimal number in seconds. This is used @@ -2260,7 +2280,7 @@ specific drivers in the page (available as part of the HTML documentation provided in -/usr/share/doc/ntp). +/usr/share/doc/ntp ).
    stratum int
    Specifies the stratum number assigned to the driver, an integer between 0 and 15. This number overrides the default stratum number @@ -2294,8 +2314,8 @@ Further information on the command can be found in Monitoring Options.
    -
    -
    +
    +


    @@ -2304,7 +2324,7 @@ command can be found in

    Miscellaneous Options

    -
    +
    broadcastdelay seconds
    The broadcast and multicast modes require a special calibration to determine the network delay between the local and remote servers. @@ -2337,7 +2357,7 @@ frequency of zero and creates the file when writing it for the first time. If this command is not given, the daemon will always start with an initial frequency of zero. -

    The file format consists of a single line containing a single +

    The file format consists of a single line containing a single floating point number, which records the frequency offset measured in parts-per-million (PPM). The file is updated by first writing @@ -2357,7 +2377,7 @@ Note that all of these flags can be controlled remotely using the ntpdc(1ntpdcmdoc) utility program. -

    +
    auth
    Enables the server to synchronize with unconfigured peers only if the peer has been correctly authenticated using either public key or private key cryptography. @@ -2492,7 +2512,7 @@ The default for this flag is enable.
    -
    includefile includefile
    This command allows additional configuration commands +
    includefile includefile
    This command allows additional configuration commands to be included from a separate file. Include files may be nested to a depth of five; upon reaching the end of any @@ -2502,12 +2522,10 @@ This option is useful for sites that run ntpd(1ntpdmdoc) on multiple hosts, with (mostly) common options (e.g., a restriction list). -
    interface
    [listen | ignore | drop] -[all | ipv4 | ipv6 | wildcard name | address [/ prefixlen] -The -interface +
    interface [listen | ignore | drop] [all | ipv4 | ipv6 | wildcard name | address [/ prefixlen]]
    The +interface directive controls which network addresses -ntpd(1ntpdmdoc) +ntpd(1ntpdmdoc) opens, and whether input is dropped without processing. The first parameter determines the aciton for addresses which match the second parameter. @@ -2515,77 +2533,77 @@ The second parameter specifies a class of addresses, or a specific interface name, or an address. In the address case, -prefixlen +prefixlen determines how many bits must match for this rule to apply. -ignore +ignore prevents opening matching addresses, -drop +drop causes -ntpd(1ntpdmdoc) +ntpd(1ntpdmdoc) to open the address and drop all received packets without examination. Multiple -interface +interface directives can be used. The last rule which matches a particular address determines the action for it. -interface +interface directives are disabled if any --I, ---interface, --L, +-I, +--interface, +-L, or ---novirtualips +--novirtualips command-line options are specified in the configuration file, all available network addresses are opened. The -nic +nic directive is an alias for -interface. -
    leapfile leapfile
    This command loads the IERS leapseconds file and initializes the +interface. +
    leapfile leapfile
    This command loads the IERS leapseconds file and initializes the leapsecond values for the next leapsecond event, leapfile expiration time, and TAI offset. The file can be obtained directly from the IERS at -https://hpiers.obspm.fr/iers/bul/bulc/ntp/leap-seconds.list +https://hpiers.obspm.fr/iers/bul/bulc/ntp/leap-seconds.list or -ftp://hpiers.obspm.fr/iers/bul/bulc/ntp/leap-seconds.list. +ftp://hpiers.obspm.fr/iers/bul/bulc/ntp/leap-seconds.list. The -leapfile +leapfile is scanned when -ntpd(1ntpdmdoc) +ntpd(1ntpdmdoc) processes the -leapfile directive or when -ntpd detects that the -leapfile +leapfile directive or when +ntpd detects that the +leapfile has changed. -ntpd +ntpd checks once a day to see if the -leapfile +leapfile has changed. The -update-leap(1update_leapmdoc) +update-leap(1update_leapmdoc) script can be run to see if the -leapfile +leapfile should be updated. -
    leapsmearinterval seconds
    This EXPERIMENTAL option is only available if -ntpd(1ntpdmdoc) +
    leapsmearinterval seconds
    This EXPERIMENTAL option is only available if +ntpd(1ntpdmdoc) was built with the ---enable-leap-smear +--enable-leap-smear option to the -configure +configure script. It specifies the interval over which a leap second correction will be applied. Recommended values for this option are between 7200 (2 hours) and 86400 (24 hours). .Sy DO NOT USE THIS OPTION ON PUBLIC-ACCESS SERVERS! See http://bugs.ntp.org/2855 for more information. -
    logconfig configkeyword
    This command controls the amount and type of output written to +
    logconfig configkeyword
    This command controls the amount and type of output written to the system -syslog(3) +syslog(3) facility or the alternate -logfile +logfile log file. By default, all output is turned on. All -configkeyword +configkeyword keywords can be prefixed with ‘=’, ‘+’ @@ -2594,117 +2612,116 @@ and where ‘=’ sets the -syslog(3) +syslog(3) priority mask, ‘+’ adds and ‘-’ removes messages. -syslog(3) +syslog(3) messages can be controlled in four classes -(clock, peer, sys and sync). +(clock, peer, sys and sync). Within these classes four types of messages can be controlled: informational messages -(info), +(info), event messages -(events), +(events), statistics messages -(statistics) +(statistics) and status messages -(status). +(status). -

    Configuration keywords are formed by concatenating the message class with +

    Configuration keywords are formed by concatenating the message class with the event class. The -all +all prefix can be used instead of a message class. A message class may also be followed by the -all +all keyword to enable/disable all messages of the respective message class. Thus, a minimal log configuration could look like this: -

              logconfig =syncstatus +sysevents
    -     
    +
         logconfig =syncstatus +sysevents
    +
    -

    This would just list the synchronizations state of -ntpd(1ntpdmdoc) +

    This would just list the synchronizations state of +ntpd(1ntpdmdoc) and the major system events. For a simple reference server, the following minimum message configuration could be useful: -

              logconfig =syncall +clockall
    -     
    +
         logconfig =syncall +clockall
    +
    -

    This configuration will list all clock information and +

    This configuration will list all clock information and synchronization information. All other events and messages about peers, system events and so on is suppressed. -

    logfile logfile
    This command specifies the location of an alternate log file to +
    logfile logfile
    This command specifies the location of an alternate log file to be used instead of the default system -syslog(3) +syslog(3) facility. This is the same operation as the --l +-l command line option. -
    mru
    [maxdepth count | maxmem kilobytes | mindepth count | maxage seconds | initialloc count | initmem kilobytes | incalloc count | incmem kilobytes] -Controls size limite of the monitoring facility's Most Recently Used +
    mru [maxdepth count | maxmem kilobytes | mindepth count | maxage seconds | initialloc count | initmem kilobytes | incalloc count | incmem kilobytes]
    Controls size limite of the monitoring facility's Most Recently Used (MRU) list of client addresses, which is also used by the rate control facility. -
    -
    maxdepth count
    maxmem kilobytes
    Equivalent upper limits on the size of the MRU list, in terms of entries or kilobytes. +
    +
    maxdepth count
    maxmem kilobytes
    Equivalent upper limits on the size of the MRU list, in terms of entries or kilobytes. The acutal limit will be up to -incalloc +incalloc entries or -incmem +incmem kilobytes larger. As with all of the -mru +mru options offered in units of entries or kilobytes, if both -maxdepth +maxdepth and -maxmem are used, the last one used controls. +maxmem are used, the last one used controls. The default is 1024 kilobytes. -
    mindepth count
    Lower limit on the MRU list size. +
    mindepth count
    Lower limit on the MRU list size. When the MRU list has fewer than -mindepth +mindepth entries, existing entries are never removed to make room for newer ones, regardless of their age. The default is 600 entries. -
    maxage seconds
    Once the MRU list has -mindepth +
    maxage seconds
    Once the MRU list has +mindepth entries and an additional client is to ba added to the list, if the oldest entry was updated more than -maxage +maxage seconds ago, that entry is removed and its storage is reused. If the oldest entry was updated more recently the MRU list is grown, subject to -maxdepth / moxmem. +maxdepth / moxmem. The default is 64 seconds. -
    initalloc count
    initmem kilobytes
    Initial memory allocation at the time the monitoringfacility is first enabled, +
    initalloc count
    initmem kilobytes
    Initial memory allocation at the time the monitoringfacility is first enabled, in terms of the number of entries or kilobytes. The default is 4 kilobytes. -
    incalloc count
    incmem kilobytes
    Size of additional memory allocations when growing the MRU list, in entries or kilobytes. +
    incalloc count
    incmem kilobytes
    Size of additional memory allocations when growing the MRU list, in entries or kilobytes. The default is 4 kilobytes.
    -
    nonvolatile threshold
    Specify the -threshold +
    nonvolatile threshold
    Specify the +threshold delta in seconds before an hourly change to the -driftfile +driftfile (frequency file) will be written, with a default value of 1e-7 (0.1 PPM). The frequency file is inspected each hour. If the difference between the current frequency and the last value written exceeds the threshold, the file is written and the -threshold +threshold becomes the new threshold value. If the threshold is not exceeeded, it is reduced by half. This is intended to reduce the number of file writes for embedded systems with nonvolatile memory. -
    phone dial ...
    This command is used in conjunction with +
    phone dial ...
    This command is used in conjunction with the ACTS modem driver (type 18) or the JJY driver (type 40, mode 100 - 180). For the ACTS modem driver (type 18), the arguments consist of @@ -2714,107 +2731,100 @@ For the JJY driver (type 40 mode 100 - 180), the argument is one telephone number used to dial the telephone JJY service. The Hayes command ATDT is normally prepended to the number. The number can contain other modem control codes as well. -
    reset
    [allpeers] -[auth] -[ctl] -[io] -[mem] -[sys] -[timer] -Reset one or more groups of counters maintained by -ntpd +
    reset [allpeers] [auth] [ctl] [io] [mem] [sys] [timer]
    Reset one or more groups of counters maintained by +ntpd and exposed by -ntpq +ntpq and -ntpdc. -
    rlimit [memlock Nmegabytes | stacksize N4kPages filenum Nfiledescriptors]
    -
    -
    memlock Nmegabytes
    Specify the number of megabytes of memory that should be +ntpdc. +
    rlimit [memlock Nmegabytes | stacksize N4kPages filenum Nfiledescriptors]
    +
    +
    memlock Nmegabytes
    Specify the number of megabytes of memory that should be allocated and locked. Probably only available under Linux, this option may be useful when dropping root (the --i +-i option). The default is 32 megabytes on non-Linux machines, and -1 under Linux. -1 means "do not lock the process into memory". 0 means "lock whatever memory the process wants into memory". -
    stacksize N4kPages
    Specifies the maximum size of the process stack on systems with the -mlockall() +
    stacksize N4kPages
    Specifies the maximum size of the process stack on systems with the +mlockall() function. Defaults to 50 4k pages (200 4k pages in OpenBSD). -
    filenum Nfiledescriptors
    Specifies the maximum number of file descriptors ntpd may have open at once. +
    filenum Nfiledescriptors
    Specifies the maximum number of file descriptors ntpd may have open at once. Defaults to the system default.
    -
    saveconfigdir directory_path
    Specify the directory in which to write configuration snapshots +
    saveconfigdir directory_path
    Specify the directory in which to write configuration snapshots requested with .Cm ntpq 's -saveconfig +saveconfig command. If -saveconfigdir +saveconfigdir does not appear in the configuration file, -saveconfig +saveconfig requests are rejected by -ntpd. -
    saveconfig filename
    Write the current configuration, including any runtime +ntpd. +
    saveconfig filename
    Write the current configuration, including any runtime modifications given with -:config +:config or -config-from-file +config-from-file to the -ntpd +ntpd host's -filename +filename in the -saveconfigdir. +saveconfigdir. This command will be rejected unless the -saveconfigdir +saveconfigdir directive appears in .Cm ntpd 's configuration file. -filename +filename can use -strftime(3) +strftime(3) format directives to substitute the current date and time, for example, -saveconfig\ ntp-%Y%m%d-%H%M%S.conf. +saveconfig\ ntp-%Y%m%d-%H%M%S.conf. The filename used is stored in the system variable -savedconfig. +savedconfig. Authentication is required. -
    setvar variable [default]
    This command adds an additional system variable. +
    setvar variable [default]
    This command adds an additional system variable. These variables can be used to distribute additional information such as the access policy. If the variable of the form -name=value +name=value is followed by the -default +default keyword, the variable will be listed as part of the default system variables -(rv command)). +(rv command)). These additional variables serve informational purposes only. They are not related to the protocol other that they can be listed. The known protocol variables will always override any variables defined via the -setvar +setvar mechanism. There are three special variables that contain the names of all variable of the same group. The -sys_var_list +sys_var_list holds the names of all system variables. The -peer_var_list +peer_var_list holds the names of all peer variables and the -clock_var_list +clock_var_list holds the names of the reference clock variables. -
    sysinfo
    Display operational summary. -
    sysstats
    Show statistucs counters maintained in the protocol module. -
    tinker [allan allan | dispersion dispersion | freq freq | huffpuff huffpuff | panic panic | step step | stepback stepback | stepfwd stepfwd | stepout stepout]
    This command can be used to alter several system variables in +
    sysinfo
    Display operational summary. +
    sysstats
    Show statistics counters maintained in the protocol module. +
    tinker [allan allan | dispersion dispersion | freq freq | huffpuff huffpuff | panic panic | step step | stepback stepback | stepfwd stepfwd | stepout stepout]
    This command can be used to alter several system variables in very exceptional circumstances. It should occur in the configuration file before any other configuration options. @@ -2831,20 +2841,20 @@ for them. Emphasis added: twisters are on their own and can expect no help from the support group. -

    The variables operate as follows: -

    -
    allan allan
    The argument becomes the new value for the minimum Allan +

    The variables operate as follows: +

    +
    allan allan
    The argument becomes the new value for the minimum Allan intercept, which is a parameter of the PLL/FLL clock discipline algorithm. The value in log2 seconds defaults to 7 (1024 s), which is also the lower limit. -
    dispersion dispersion
    The argument becomes the new value for the dispersion increase rate, +
    dispersion dispersion
    The argument becomes the new value for the dispersion increase rate, normally .000015 s/s. -
    freq freq
    The argument becomes the initial value of the frequency offset in +
    freq freq
    The argument becomes the initial value of the frequency offset in parts-per-million. This overrides the value in the frequency file, if present, and avoids the initial training state if it is not. -
    huffpuff huffpuff
    The argument becomes the new value for the experimental +
    huffpuff huffpuff
    The argument becomes the new value for the experimental huff-n'-puff filter span, which determines the most recent interval the algorithm will search for a minimum delay. The lower limit is @@ -2852,11 +2862,11 @@ The lower limit is There is no default, since the filter is not enabled unless this command is given. -
    panic panic
    The argument is the panic threshold, normally 1000 s. +
    panic panic
    The argument is the panic threshold, normally 1000 s. If set to zero, the panic sanity check is disabled and a clock offset of any value will be accepted. -
    step step
    The argument is the step threshold, which by default is 0.128 s. +
    step step
    The argument is the step threshold, which by default is 0.128 s. It can be set to any positive number in seconds. If set to zero, step @@ -2864,7 +2874,7 @@ adjustments will never occur. Note: The kernel time discipline is disabled if the step threshold is set to zero or greater than the default. -
    stepback stepback
    The argument is the step threshold for the backward direction, +
    stepback stepback
    The argument is the step threshold for the backward direction, which by default is 0.128 s. It can be set to any positive number in seconds. @@ -2874,26 +2884,25 @@ Note: The kernel time discipline is disabled if each direction of step threshold are either set to zero or greater than .5 second. -
    stepfwd stepfwd
    As for stepback, but for the forward direction. -
    stepout stepout
    The argument is the stepout timeout, which by default is 900 s. +
    stepfwd stepfwd
    As for stepback, but for the forward direction. +
    stepout stepout
    The argument is the stepout timeout, which by default is 900 s. It can be set to any positive number in seconds. If set to zero, the stepout pulses will not be suppressed.
    -
    writevar assocID\ name = value [,...]
    Write (create or update) the specified variables. +
    writevar assocID\ name = value [,...]
    Write (create or update) the specified variables. If the -assocID +assocID is zero, the variablea re from the system variables name space, otherwise they are from the peer variables name space. The -assocID -is required, as the same name can occur in both name spaces. - -
    trap host_address [port port_number] [interface interface_address]
    This command configures a trap receiver at the given host +assocID +is required, as the same name can occur in both name spaces. +
    trap host_address [port port_number] [interface interface_address]
    This command configures a trap receiver at the given host address and port number for sending messages with the specified local interface address. If the port number is unspecified, a value @@ -2903,20 +2912,20 @@ message is sent with a source address of the local interface the message is sent through. Note that on a multihomed host the interface used may vary from time to time with routing changes. -
    ttl hop ...
    This command specifies a list of TTL values in increasing order. +
    ttl hop ...
    This command specifies a list of TTL values in increasing order. Up to 8 values can be specified. In -manycast +manycast mode these values are used in-turn in an expanding-ring search. The default is eight multiples of 32 starting at 31. -

    The trap receiver will generally log event messages and other +

    The trap receiver will generally log event messages and other information from the server in a log file. While such monitor programs may also request their own trap dynamically, configuring a trap receiver will ensure that no messages are lost when the server is started. -

    hop ...
    This command specifies a list of TTL values in increasing order, up to 8 +
    hop ...
    This command specifies a list of TTL values in increasing order, up to 8 values can be specified. In manycast mode these values are used in turn in an expanding-ring search. @@ -2924,18 +2933,18 @@ The default is eight multiples of 32 starting at 31.
    -

    This section was generated by AutoGen, -using the agtexi-cmd template and the option descriptions for the ntp.conf program. +

    This section was generated by AutoGen, +using the agtexi-cmd template and the option descriptions for the ntp.conf program. This software is released under the NTP license, <http://ntp.org/license>. -