-----邮件原件----- 发件人: Miroslav Lichvar [mailto:mlich...@redhat.com] 发送时间: 2022年12月1日 16:25 收件人: chrony-users@chrony.tuxfamily.org 主题: Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6
On Thu, Dec 01, 2022 at 08:16:29AM +0000, chengyechun wrote: > Yes, I use ntsratelimit to explain this phenomenon. My configuration > is ntsratelimit interval 3 burst 1. I find that the default value of > leak is 2, indicating that the leak rate is 0.25, which seems to > explain why the leak rate is 24s. However, when leak is changed to 3, > the leak rate is 0.125, the tls handshake failure time does not > increase, even if interval is changed to 4, which means the interval > is 16s. It's still the same phenomenon, The "leak" is randomly distributed. Have you tried to run the test longer and see if the average converges to the expected value? I see, I'll write a test case to verify it and explain the result later. But it doesn't seem to make much sense. -- Miroslav Lichvar -- To unsubscribe email chrony-users-requ...@chrony.tuxfamily.org with "unsubscribe" in the subject. For help email chrony-users-requ...@chrony.tuxfamily.org with "help" in the subject. Trouble? Email listmas...@chrony.tuxfamily.org.