Mark! Heads up...exernal/marketing issue incoming.

Hal Murray via devel <devel@ntpsec.org>:
> Is anybody using/testing it?

Not as far as I know

> We don't support receiving broadcast.

No, I removed that after Daniel explained that it's unsecurable. 

> It used to support a ttl option.  That got broken/dropped somewhere
> along the way.  Should I restore that?  Or maybe document that it is
> missing?  ...

I believe I already performed that documentationectomy.  If there are
remnants, of course we need to fix them in one direction or the other
depending about the high-level decision aout supporting brodast mode.

> Context is that I'm cleaning up the mode/ttl mess.  The mode for
> refclocks used to live in the ttl slot.  Since the ttl slot isn't
> used any more, I'm fixing up all the names.

Good plan.

About the major issue:

I believe we retained bradcast mode thinking of a scenario where a bunch
of Windows machines on a lan are being fed time information from NTPsec.

You're our NTP operations old hand.  Do you think this is common?

The big question is whetger this is an important scenario for us to cover.
In view of who we have an eye on as a target market, I'm inclined to
doubt it...but this kind of thing in Mark's bailiwick.

I of course, would be happy to remove it to reduce complexity and
testing scenarios.
-- 
                <a href="http://www.catb.org/~esr/";>Eric S. Raymond</a>

My work is funded by the Internet Civil Engineering Institute: https://icei.org
Please visit their site and donate: the civilization you save might be your own.


_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to