|
Lines 268-274
Link Here
|
| 268 |
All packets sent to and received from the server or peer are to |
268 |
All packets sent to and received from the server or peer are to |
| 269 |
include authentication fields encrypted using the autokey scheme |
269 |
include authentication fields encrypted using the autokey scheme |
| 270 |
described in |
270 |
described in |
| 271 |
.Sx Authentication Options . |
271 |
.Sx Authentication Commands . |
| 272 |
.It Cm burst |
272 |
.It Cm burst |
| 273 |
when the server is reachable, send a burst of eight packets |
273 |
when the server is reachable, send a burst of eight packets |
| 274 |
instead of the usual one. |
274 |
instead of the usual one. |
|
Lines 305-311
Link Here
|
| 305 |
.It Cm minpoll Ar minpoll |
305 |
.It Cm minpoll Ar minpoll |
| 306 |
.It Cm maxpoll Ar maxpoll |
306 |
.It Cm maxpoll Ar maxpoll |
| 307 |
These options specify the minimum and maximum poll intervals |
307 |
These options specify the minimum and maximum poll intervals |
| 308 |
for NTP messages, as a power of 2 in seconds |
308 |
for NTP messages, as a power of 2 in seconds. |
| 309 |
The maximum poll |
309 |
The maximum poll |
| 310 |
interval defaults to 10 (1,024 s), but can be increased by the |
310 |
interval defaults to 10 (1,024 s), but can be increased by the |
| 311 |
.Cm maxpoll |
311 |
.Cm maxpoll |
|
Lines 363-369
Link Here
|
| 363 |
to avoid accidental or malicious disruption in this mode, both the |
363 |
to avoid accidental or malicious disruption in this mode, both the |
| 364 |
server and client should operate using symmetric-key or public-key |
364 |
server and client should operate using symmetric-key or public-key |
| 365 |
authentication as described in |
365 |
authentication as described in |
| 366 |
.Sx Authentication Options . |
366 |
.Sx Authentication Commands . |
| 367 |
.It Ic manycastserver Ar address ... |
367 |
.It Ic manycastserver Ar address ... |
| 368 |
This command enables reception of manycast client messages to |
368 |
This command enables reception of manycast client messages to |
| 369 |
the multicast group address(es) (type m) specified. |
369 |
the multicast group address(es) (type m) specified. |
|
Lines 376-382
Link Here
|
| 376 |
accidental or malicious disruption in this mode, both the server |
376 |
accidental or malicious disruption in this mode, both the server |
| 377 |
and client should operate using symmetric-key or public-key |
377 |
and client should operate using symmetric-key or public-key |
| 378 |
authentication as described in |
378 |
authentication as described in |
| 379 |
.Sx Authentication Options . |
379 |
.Sx Authentication Commands . |
| 380 |
.It Ic multicastclient Ar address ... |
380 |
.It Ic multicastclient Ar address ... |
| 381 |
This command enables reception of multicast server messages to |
381 |
This command enables reception of multicast server messages to |
| 382 |
the multicast group address(es) (type m) specified. |
382 |
the multicast group address(es) (type m) specified. |
|
Lines 389-395
Link Here
|
| 389 |
in order to avoid accidental or malicious disruption in this mode, |
389 |
in order to avoid accidental or malicious disruption in this mode, |
| 390 |
both the server and client should operate using symmetric-key or |
390 |
both the server and client should operate using symmetric-key or |
| 391 |
public-key authentication as described in |
391 |
public-key authentication as described in |
| 392 |
.Sx Authentication Options . |
392 |
.Sx Authentication Commands . |
| 393 |
.El |
393 |
.El |
| 394 |
.Sh Authentication Support |
394 |
.Sh Authentication Support |
| 395 |
Authentication support allows the NTP client to verify that the |
395 |
Authentication support allows the NTP client to verify that the |
|
Lines 466-472
Link Here
|
| 466 |
Furthermore, the Autokey scheme requires a |
466 |
Furthermore, the Autokey scheme requires a |
| 467 |
preliminary protocol exchange to obtain |
467 |
preliminary protocol exchange to obtain |
| 468 |
the server certificate, verify its |
468 |
the server certificate, verify its |
| 469 |
credentials and initialize the protocol |
469 |
credentials and initialize the protocol. |
| 470 |
.Pp |
470 |
.Pp |
| 471 |
The |
471 |
The |
| 472 |
.Cm auth |
472 |
.Cm auth |
|
Lines 669-675
Link Here
|
| 669 |
all of which are bound together by the protocol specifically |
669 |
all of which are bound together by the protocol specifically |
| 670 |
to deflect masquerade attacks. |
670 |
to deflect masquerade attacks. |
| 671 |
For this reason Autokey |
671 |
For this reason Autokey |
| 672 |
includes the source and destinatino IP addresses in message digest |
672 |
includes the source and destination IP addresses in message digest |
| 673 |
computations and so the same addresses must be available |
673 |
computations and so the same addresses must be available |
| 674 |
at both the server and client. |
674 |
at both the server and client. |
| 675 |
For this reason operation |
675 |
For this reason operation |
|
Lines 796-802
Link Here
|
| 796 |
a subject key identifier or a issuer key identifier field; |
796 |
a subject key identifier or a issuer key identifier field; |
| 797 |
however, an extended key usage field for a trusted host must |
797 |
however, an extended key usage field for a trusted host must |
| 798 |
contain the value |
798 |
contain the value |
| 799 |
.Cm trustRoot ; . |
799 |
.Cm trustRoot . |
| 800 |
Other extension fields are ignored. |
800 |
Other extension fields are ignored. |
| 801 |
.Ss Authentication Commands |
801 |
.Ss Authentication Commands |
| 802 |
.Bl -tag -width indent |
802 |
.Bl -tag -width indent |
|
Lines 1068-1077
Link Here
|
| 1068 |
The first two fields show the date (Modified Julian Day) and time |
1068 |
The first two fields show the date (Modified Julian Day) and time |
| 1069 |
(seconds and fraction past UTC midnight). |
1069 |
(seconds and fraction past UTC midnight). |
| 1070 |
The next field shows the peer |
1070 |
The next field shows the peer |
| 1071 |
address in dotted-quad notation, The final message field includes the |
1071 |
address in dotted-quad notation. The final message field includes the |
| 1072 |
message type and certain ancillary information. |
1072 |
message type and certain ancillary information. |
| 1073 |
See the |
1073 |
See the |
| 1074 |
.Sx Authentication Options |
1074 |
.Sx Authentication Commands |
| 1075 |
section for further information. |
1075 |
section for further information. |
| 1076 |
.It Cm loopstats |
1076 |
.It Cm loopstats |
| 1077 |
Enables recording of loop filter statistics information. |
1077 |
Enables recording of loop filter statistics information. |
|
Lines 1155-1161
Link Here
|
| 1155 |
.It Packets received Cm 81965 |
1155 |
.It Packets received Cm 81965 |
| 1156 |
Total number of packets received. |
1156 |
Total number of packets received. |
| 1157 |
.It Packets processed Cm 0 |
1157 |
.It Packets processed Cm 0 |
| 1158 |
Number of packets received in response to previous packets sent |
1158 |
Number of packets received in response to previous packets sent. |
| 1159 |
.It Current version Cm 9546 |
1159 |
.It Current version Cm 9546 |
| 1160 |
Number of packets matching the current NTP version. |
1160 |
Number of packets matching the current NTP version. |
| 1161 |
.It Previous version Cm 56 |
1161 |
.It Previous version Cm 56 |
|
Lines 1461-1467
Link Here
|
| 1461 |
spacing, while the |
1461 |
spacing, while the |
| 1462 |
.Cm minimum |
1462 |
.Cm minimum |
| 1463 |
subcommand specifies the minimum packet spacing. |
1463 |
subcommand specifies the minimum packet spacing. |
| 1464 |
Packets that violate these minima are discarded |
1464 |
Packets that violate these minimum are discarded |
| 1465 |
and a kiss-o'-death packet returned if enabled. |
1465 |
and a kiss-o'-death packet returned if enabled. |
| 1466 |
The default |
1466 |
The default |
| 1467 |
minimum average and minimum are 5 and 2, respectively. |
1467 |
minimum average and minimum are 5 and 2, respectively. |
|
Lines 1775-1781
Link Here
|
| 1775 |
servers which can be found by manycast client associations. |
1775 |
servers which can be found by manycast client associations. |
| 1776 |
Because manycast servers respond only when the client |
1776 |
Because manycast servers respond only when the client |
| 1777 |
stratum is equal to or greater than the server stratum, |
1777 |
stratum is equal to or greater than the server stratum, |
| 1778 |
primary (stratum 1) servers fill find only primary servers |
1778 |
primary (stratum 1) servers will find only primary servers |
| 1779 |
in TTL range, which is probably the most common objective. |
1779 |
in TTL range, which is probably the most common objective. |
| 1780 |
However, unless configured otherwise, all manycast clients |
1780 |
However, unless configured otherwise, all manycast clients |
| 1781 |
in TTL range will eventually find all primary servers |
1781 |
in TTL range will eventually find all primary servers |
|
Lines 1955-1961
Link Here
|
| 1955 |
This value defaults to 1, but can be changed |
1955 |
This value defaults to 1, but can be changed |
| 1956 |
to any number from 1 to 15. |
1956 |
to any number from 1 to 15. |
| 1957 |
.It Cm minclock Ar minclock |
1957 |
.It Cm minclock Ar minclock |
| 1958 |
The clustering algorithm repeatedly casts out outlyer |
1958 |
The clustering algorithm repeatedly casts out outerlayer |
| 1959 |
associations until no more than |
1959 |
associations until no more than |
| 1960 |
.Cm minclock |
1960 |
.Cm minclock |
| 1961 |
associations remain. |
1961 |
associations remain. |
|
Lines 1965-1971
Link Here
|
| 1965 |
.It Cm minsane Ar minsane |
1965 |
.It Cm minsane Ar minsane |
| 1966 |
This is the minimum number of candidates available |
1966 |
This is the minimum number of candidates available |
| 1967 |
to the clock selection algorithm in order to produce |
1967 |
to the clock selection algorithm in order to produce |
| 1968 |
one or more truechimers for the clustering algorithm. |
1968 |
one or more true chimers for the clustering algorithm. |
| 1969 |
If fewer than this number are available, the clock is |
1969 |
If fewer than this number are available, the clock is |
| 1970 |
undisciplined and allowed to run free. |
1970 |
undisciplined and allowed to run free. |
| 1971 |
The default is 1 |
1971 |
The default is 1 |