Re: [ntp:questions] Ruh, roh. Leap Second?

2008-07-02 Thread David L. Mills
Martin,

There can be a disconnect of serveral months between some gimmick in the 
development branch and when it appears on supermarket shelves; however, 
the current version does explicitly announce impending leaps in the 
protostats file and does take a vote among the sources on whether to 
mark the calendar for a leap. All this is overridden if the NIST 
leapseconds file is present.

Dave

Martin Burnicki wrote:
 Dave,
 
 David L. Mills wrote:
 
Peter,

I head the same comment over the jungle telegraph. However, in the
distributions that leave here there is no such comment, so it would have
to come from somewhere else or from a modified distribution. 
 
 
 The message:
 
   Clock: inserting leap second 23:59:60 UTC
 
 can be found in the Linux kernel sources. So this indicates ntpd has indeed
 received a leap second announcement from an upstream time source and has
 passed that announcement to the kernel which has then inserted the leap
 second. AFAIK that's the way leap seconds should be handled on systems
 which provide a kernel PLL.
 
 The following time reset happened after that to undo the faulty leap
 second and step back to the correct time. 
 
 So the basic question is from which upstream time source the faulty leap
 second announcement has been received. 
 
 
To help 
spot feckless fingers, recent versions have a protostats file in the
statistics collection and official reports go there, as well as the
system log if configured. These reports are described in the decode.html
page in the docuentation.
 
 
 I'm not familiar with the protostats file, but I assume it is only generated
 if explicitely configured in ntp.conf, similar to the other stats files.
 
 Since such faulty leap second announcements have been reported here several
 times I'd really appreciate if there would be a log entry generated by
 default if a leap second announcement is received. That log entry should
 also indicate from which time source that announcement has been received,
 so a faulty time source could easily be identified and fixed or discarded
 in order to prevent those faults the next time.
 
 Martin

___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/questions


[ntp:questions] Utility to measure time drift

2008-07-02 Thread jkvbe

I'm looking for a utility like clockdiff(8)  to measure the time delta
between different machines. The utility itself should run on Windows, but
the machines under investigation are running Linux.

Thanks,

Jan


___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/questions


Re: [ntp:questions] Utility to measure time drift

2008-07-02 Thread Maarten Wiltink
jkvbe [EMAIL PROTECTED] wrote in message
news:[EMAIL PROTECTED]

 I'm looking for a utility like clockdiff(8)  to measure the time
 delta between different machines. The utility itself should run on
 Windows, but the machines under investigation are running Linux.

The usual approach is to set up a machine that has all the machines
under scrutiny as servers in its NTP configuration, possibly all
marked noselect - I'm not sure about that bit.

Ntpq -p will then tell you the offset to them all, relative to a
single base (the monitoring server's own notion of time).

Note that this is subject to all the vagaries of normal NTP life.
If the DSL connection to one server is heavily overloaded, the
offset will reflect that.

Groetjes,
Maarten Wiltink


___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/questions


Re: [ntp:questions] Ruh, roh. Leap Second?

2008-07-02 Thread Hal Murray
In article [EMAIL PROTECTED],
 [EMAIL PROTECTED] (Peter Laws) writes:
1 Time(s): Clock: inserting leap second 23:59:60 UTC

RHEL 5.2 system running ntpq [EMAIL PROTECTED] Thu Jan 17 18:14:14 UTC 2008
(1) which is the default for that distribution.  Grepping around in the
logs it appears that most or all of my RHEL systems did it.

I got this, too, on at least one system:

Jun 30 19:34:53 ozz-1300 ntpd[2659]: time reset +1.000360 s


Humm.  I got one too, back in 2005, 6 months ahead of the last leap second.

I wonder what was going on back then,


Jun 21 01:09:33 shuksan ntpd[1794]: ntpd [EMAIL PROTECTED] Thu Apr 14 07:47:25 
EDT 2005 (1)

Jun 30 16:59:59 shuksan kernel: Clock: inserting leap second 23:59:60 UTC
Jun 30 17:57:14 shuksan ntpd[1794]: time reset +1.014226 s

-- 
These are my opinions, not necessarily my employer's.  I hate spam.

___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/questions


[ntp:questions] Generating keys for ntpdc control

2008-07-02 Thread Bob
Can someone run me through the steps necessary to generate, and apply keys 
so I can use ntpdc to make on the fly changes to ntpd? I've read through the 
docs - repeatedly! - and tried every incarnation of ntp-keygen listed. What 
I seem not to be able to get is what the key number represents. I suspect 
that it's got something to do with the -v option where it generates numbered 
keys, but creating them with a password ,and then specifying one  - like key 
1 - after entering password in ntpdc results in the cursor simply staring 
back at me. The keygen section of the docs includes the statement Following 
hte heard the keys are entered one per line in the format keyno type key, 
which I suspect is a typo, but I'm still not getting it. I suspect there 
needs to be a file referring to what key number is what.

I'm running the current Meinberg windows port. This comes about because of a 
question I asked last week about KOD. It was suggested that I could use 
ntpdc to effect the necessary changes by either setting up symmetric keys or 
disabling authentication. Well, I didn't have any luck with the keys, so I 
disabled authentication.

That didn't work for two reasons: ntpdc still wouldn't talk to ntpd, and I 
found that someone at 66.80.7.58 does know how to reconfigure ntpd remotely. 
I looked at my logs on the morning of 26 June, and found that I was now 
polling that address several times a second for time. Looking at my host 
server list, I showed that address listed about 20 times as mode 1 (whatever 
that is???) I didn't do it, and it wasn't in the config file.Also, it 
started after I disabled auth.  Enabling auth, and restarting fixed it, 
although he kept trying  for the rest of the day. I think the intention was 
to make himself an authoritive source and force my clock to drift, as his 
incoming timestamps looked to be off by at least a minute. Hackers. 
And not the good definition, either. 


___
questions mailing list
questions@lists.ntp.org
https://lists.ntp.org/mailman/listinfo/questions