-----邮件原件-----
发件人: Miroslav Lichvar [mailto:mlich...@redhat.com] 
发送时间: 2022年12月1日 16:25
收件人: chrony-users@chrony.tuxfamily.org
主题: Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6

On Thu, Dec 01, 2022 at 08:16:29AM +0000, chengyechun wrote:
> Yes, I use ntsratelimit to explain this phenomenon. My configuration 
> is ntsratelimit interval 3 burst 1. I find that the default value of 
> leak is 2, indicating that the leak rate is 0.25, which seems to 
> explain why the leak rate is 24s. However, when leak is changed to 3, 
> the leak rate is 0.125, the tls handshake failure time does not 
> increase, even if interval is changed to 4, which means the interval 
> is 16s. It's still the same phenomenon,

The "leak" is randomly distributed. Have you tried to run the test longer and 
see if the average converges to the expected value?
I see, I'll write a test case to verify it and explain the result later. But it 
doesn't seem to make much sense.
--
Miroslav Lichvar


-- 
To unsubscribe email chrony-users-requ...@chrony.tuxfamily.org 
with "unsubscribe" in the subject.
For help email chrony-users-requ...@chrony.tuxfamily.org 
with "help" in the subject.
Trouble?  Email listmas...@chrony.tuxfamily.org.


Reply via email to