>> > ***** Request Packet *******
>> > Internet Protocol, Src: 68.152.80.170 (68.152.80.170), Dst:
>> > 38.98.155.10 (38.98.155.10)
>> > User Datagram Protocol, Src Port: 62096 (62096), Dst Port: ntp (123)
>> > Network Time Protocol
...


>> > ***** Reply packet **********
>> > Internet Protocol, Src: 38.98.155.10 (38.98.155.10), Dst:
>> > 68.152.80.170 (68.152.80.170)
>> > User Datagram Protocol, Src Port: ntp (123), Dst Port: 62096 (62096)
>> > Network Time Protocol
...

How long are the packets?  Both the ones that work and the ones
that don't work.

NTP has some optional authentication stuff that gets appended to
the standard packet.  There is some discussion on another list
about MS inventing their own incompatible authentication.

If the packets that don't work are longer than normal, that's
probably what is going on.

-- 
These are my opinions, not necessarily my employer's.  I hate spam.

_______________________________________________
questions mailing list
[email protected]
https://lists.ntp.org/mailman/listinfo/questions

Reply via email to