As part of the IETF Network Time Security (NTS) effort, it would be helpful to understand the importance of NTP's symmetric peering mode. Can folks on this list please share their experience with NTP's symmetric mode?
Do you use it, and if so why (or why not), and if so in what operational environment are you using it? Active/active or active/passive? Crypto authentication or not? Thank you, Sharon (For NTS design team) -- Sharon Goldberg Computer Science, Boston University http://www.cs.bu.edu/~goldbe _______________________________________________ time-nuts mailing list -- time-nuts@febo.com To unsubscribe, go to https://www.febo.com/cgi-bin/mailman/listinfo/time-nuts and follow the instructions there.