>> > ***** Request Packet ******* >> > Internet Protocol, Src: 68.152.80.170 (68.152.80.170), Dst: >> > 38.98.155.10 (38.98.155.10) >> > User Datagram Protocol, Src Port: 62096 (62096), Dst Port: ntp (123) >> > Network Time Protocol ...
>> > ***** Reply packet ********** >> > Internet Protocol, Src: 38.98.155.10 (38.98.155.10), Dst: >> > 68.152.80.170 (68.152.80.170) >> > User Datagram Protocol, Src Port: ntp (123), Dst Port: 62096 (62096) >> > Network Time Protocol ... How long are the packets? Both the ones that work and the ones that don't work. NTP has some optional authentication stuff that gets appended to the standard packet. There is some discussion on another list about MS inventing their own incompatible authentication. If the packets that don't work are longer than normal, that's probably what is going on. -- These are my opinions, not necessarily my employer's. I hate spam. _______________________________________________ questions mailing list [email protected] https://lists.ntp.org/mailman/listinfo/questions
