In article <[EMAIL PROTECTED]>, Steve Kostecke <[EMAIL PROTECTED]> wrote:
>I'm not sure why you would consider the server's trusted host parameters >to be "unauthentic". And they are made "trusted" by simply asserting that they are so (i.e., by setting a bit in a self-signed "certificate")? That's what the documentation implies. >You may wish to review the documentation before passing judgment. Oddly enough, I have, several times, and I have never once been able to get ntpd to actually behave usefully (never mind correctly) on the basis of that documentation (or at least those parts that make any sense at all). ntpd is in dire need of a competent tech writer who can actually understand Prof. Mills's writing and translate it into language comprehensible to us mere mortals (including descriptions of how to make standard configurations work with the various schemes, and why you might want to, and which version of ntpd is actually required in order for it to work). -GAWollman -- Garrett A. Wollman | The real tragedy of human existence is not that we are [EMAIL PROTECTED]| nasty by nature, but that a cruel structural asymmetry Opinions not those | grants to rare events of meanness such power to shape of MIT or CSAIL. | our history. - S.J. Gould, Ten Thousand Acts of Kindness _______________________________________________ questions mailing list [email protected] https://lists.ntp.isc.org/mailman/listinfo/questions
