|
Lines 22-42
Link Here
|
| 22 |
.Em Note : |
22 |
.Em Note : |
| 23 |
The functionality of this program is now available |
23 |
The functionality of this program is now available |
| 24 |
in the |
24 |
in the |
| 25 |
.Xr ntpd 8 |
25 |
.Xr ntpd 8 |
| 26 |
program. |
26 |
program. |
| 27 |
See the |
27 |
See the |
| 28 |
.Fl q |
28 |
.Fl q |
| 29 |
command line |
29 |
command line |
| 30 |
option in the |
30 |
option in the |
| 31 |
.Xr ntpd 8 |
31 |
.Xr ntpd 8 |
| 32 |
page. |
32 |
page. |
| 33 |
After a suitable period of |
33 |
After a suitable period of |
| 34 |
mourning, the |
34 |
mourning, the |
| 35 |
.Nm |
35 |
.Nm |
| 36 |
program is to be retired from this |
36 |
program is to be retired from this |
| 37 |
distribution. |
37 |
distribution. |
| 38 |
.Pp |
38 |
.Pp |
| 39 |
.Nm |
39 |
.Nm |
| 40 |
sets the local date and time by polling the |
40 |
sets the local date and time by polling the |
| 41 |
Network Time Protocol (NTP) server(s) given as the |
41 |
Network Time Protocol (NTP) server(s) given as the |
| 42 |
.Ar server |
42 |
.Ar server |
|
Lines 48-54
Link Here
|
| 48 |
selection algorithms are applied to select the best of these. |
48 |
selection algorithms are applied to select the best of these. |
| 49 |
Note |
49 |
Note |
| 50 |
that the accuracy and reliability of |
50 |
that the accuracy and reliability of |
| 51 |
.Nm |
51 |
.Nm |
| 52 |
depends on |
52 |
depends on |
| 53 |
the number of servers, the number of polls each time it is run and |
53 |
the number of servers, the number of polls each time it is run and |
| 54 |
the interval between runs. |
54 |
the interval between runs. |
|
Lines 58-64
Link Here
|
| 58 |
.It Fl a Ar key |
58 |
.It Fl a Ar key |
| 59 |
Enable the authentication function and specify the key |
59 |
Enable the authentication function and specify the key |
| 60 |
identifier to be used for authentication as the argument |
60 |
identifier to be used for authentication as the argument |
| 61 |
.Ar key |
61 |
.Ar key . |
| 62 |
The keys and key identifiers must match |
62 |
The keys and key identifiers must match |
| 63 |
in both the client and server key files. |
63 |
in both the client and server key files. |
| 64 |
The default is to disable |
64 |
The default is to disable |
|
Lines 74-82
Link Here
|
| 74 |
if the offset is |
74 |
if the offset is |
| 75 |
greater than +-128 ms. |
75 |
greater than +-128 ms. |
| 76 |
Note that, if the offset is much greater |
76 |
Note that, if the offset is much greater |
| 77 |
than +-128 ms in this case, that it can take a long time (hours) to |
77 |
than +-128 ms in this case, it can take a long time (hours) to |
| 78 |
slew the clock to the correct value. |
78 |
slew the clock to the correct value. |
| 79 |
During this time. the host |
79 |
During this time, the host |
| 80 |
should not be used to synchronize clients. |
80 |
should not be used to synchronize clients. |
| 81 |
.It Fl b |
81 |
.It Fl b |
| 82 |
Force the time to be stepped using the |
82 |
Force the time to be stepped using the |
|
Lines 89-95
Link Here
|
| 89 |
time. |
89 |
time. |
| 90 |
.It Fl d |
90 |
.It Fl d |
| 91 |
Enable the debugging mode, in which |
91 |
Enable the debugging mode, in which |
| 92 |
.Nm |
92 |
.Nm |
| 93 |
will go |
93 |
will go |
| 94 |
through all the steps, but not adjust the local clock. |
94 |
through all the steps, but not adjust the local clock. |
| 95 |
Information |
95 |
Information |
|
Lines 100-106
Link Here
|
| 100 |
.Ar authdelay , |
100 |
.Ar authdelay , |
| 101 |
in seconds and fraction |
101 |
in seconds and fraction |
| 102 |
(see |
102 |
(see |
| 103 |
.Xr ntpd 8 |
103 |
.Xr ntpd 8 |
| 104 |
for details). |
104 |
for details). |
| 105 |
This number is usually small |
105 |
This number is usually small |
| 106 |
enough to be negligible for most purposes, though specifying a |
106 |
enough to be negligible for most purposes, though specifying a |
|
Lines 112-125
Link Here
|
| 112 |
.Pa /etc/ntp.keys . |
112 |
.Pa /etc/ntp.keys . |
| 113 |
This file |
113 |
This file |
| 114 |
should be in the format described in |
114 |
should be in the format described in |
| 115 |
.Xr ntpd 8 . |
115 |
.Xr ntpd 8 . |
| 116 |
.It Fl o Ar version |
116 |
.It Fl o Ar version |
| 117 |
Specify the NTP version for outgoint packets as the integer |
117 |
Specify the NTP version for outgoint packets as the integer |
| 118 |
.Ar version , |
118 |
.Ar version , |
| 119 |
which can be 1 or 2. |
119 |
which can be 1 or 2. |
| 120 |
The default is 3. |
120 |
The default is 3. |
| 121 |
This allows |
121 |
This allows |
| 122 |
.Nm |
122 |
.Nm |
| 123 |
to be used with older NTP versions. |
123 |
to be used with older NTP versions. |
| 124 |
.It Fl p Ar samples |
124 |
.It Fl p Ar samples |
| 125 |
Specify the number of samples to be acquired from each server |
125 |
Specify the number of samples to be acquired from each server |
|
Lines 132-162
Link Here
|
| 132 |
.It Fl s |
132 |
.It Fl s |
| 133 |
Divert logging output from the standard output (default) to the |
133 |
Divert logging output from the standard output (default) to the |
| 134 |
system |
134 |
system |
| 135 |
.Xr syslog 3 |
135 |
.Xr syslog 3 |
| 136 |
facility. |
136 |
facility. |
| 137 |
This is designed primarily for |
137 |
This is designed primarily for |
| 138 |
convenience of |
138 |
convenience of |
| 139 |
.Xr cron 8 |
139 |
.Xr cron 8 |
| 140 |
scripts. |
140 |
scripts. |
| 141 |
.It Fl t Ar timeout |
141 |
.It Fl t Ar timeout |
| 142 |
Specify the maximum time waiting for a server response as the |
142 |
Specify the maximum time waiting for a server response as the |
| 143 |
value |
143 |
value |
| 144 |
.Ar timeout , |
144 |
.Ar timeout , |
| 145 |
in seconds and fraction. |
145 |
in seconds and fraction. |
| 146 |
The value is is |
146 |
The value is |
| 147 |
rounded to a multiple of 0.2 seconds. |
147 |
rounded to a multiple of 0.2 seconds. |
| 148 |
The default is 1 second, a |
148 |
The default is 1 second, a |
| 149 |
value suitable for polling across a LAN. |
149 |
value suitable for polling across a LAN. |
| 150 |
.It Fl u |
150 |
.It Fl u |
| 151 |
Direct |
151 |
Direct |
| 152 |
.Nm |
152 |
.Nm |
| 153 |
to use an unprivileged port or outgoing |
153 |
to use an unprivileged port for outgoing |
| 154 |
packets. |
154 |
packets. |
| 155 |
This is most useful when behind a firewall that blocks |
155 |
This is most useful when behind a firewall that blocks |
| 156 |
incoming traffic to privileged ports, and you want to synchronise |
156 |
incoming traffic to privileged ports, and you want to synchronise |
| 157 |
with hosts beyond the firewall. |
157 |
with hosts beyond the firewall. |
| 158 |
Note that the |
158 |
Note that the |
| 159 |
.Fl d |
159 |
.Fl d |
| 160 |
option |
160 |
option |
| 161 |
always uses unprivileged ports. |
161 |
always uses unprivileged ports. |
| 162 |
.It Fl v |
162 |
.It Fl v |
|
Lines 167-209
Link Here
|
| 167 |
identification string to be logged. |
167 |
identification string to be logged. |
| 168 |
.El |
168 |
.El |
| 169 |
.Pp |
169 |
.Pp |
| 170 |
.Nm |
170 |
.Nm |
| 171 |
can be run manually as necessary to set the |
171 |
can be run manually as necessary to set the |
| 172 |
host clock, or it can be run from the host startup script to set |
172 |
host clock, or it can be run from the host startup script to set |
| 173 |
the clock at boot time. |
173 |
the clock at boot time. |
| 174 |
This is useful in some cases to set the |
174 |
This is useful in some cases to set the |
| 175 |
clock initially before starting the NTP daemon |
175 |
clock initially before starting the NTP daemon |
| 176 |
.Xr ntpd 8 . |
176 |
.Xr ntpd 8 . |
| 177 |
It is |
177 |
It is |
| 178 |
also possible to run |
178 |
also possible to run |
| 179 |
.Nm |
179 |
.Nm |
| 180 |
from a |
180 |
from a |
| 181 |
.Xr cron 8 |
181 |
.Xr cron 8 |
| 182 |
script. |
182 |
script. |
| 183 |
However, it is important to note that |
183 |
However, it is important to note that |
| 184 |
.Nm |
184 |
.Nm |
| 185 |
with |
185 |
with |
| 186 |
contrived |
186 |
contrived |
| 187 |
.Xr cron 8 |
187 |
.Xr cron 8 |
| 188 |
scripts is no substitute for the NTP |
188 |
scripts is no substitute for the NTP |
| 189 |
daemon, which uses sophisticated algorithms to maximize accuracy |
189 |
daemon, which uses sophisticated algorithms to maximize accuracy |
| 190 |
and reliability while minimizing resource use. |
190 |
and reliability while minimizing resource use. |
| 191 |
Finally, since |
191 |
Finally, since |
| 192 |
.Nm |
192 |
.Nm |
| 193 |
does not discipline the host clock frequency as |
193 |
does not discipline the host clock frequency as |
| 194 |
does |
194 |
does |
| 195 |
.Xr ntpd 8 , |
195 |
.Xr ntpd 8 , |
| 196 |
the accuracy using |
196 |
the accuracy using |
| 197 |
.Nm |
197 |
.Nm |
| 198 |
is |
198 |
is |
| 199 |
limited. |
199 |
limited. |
| 200 |
.Pp |
200 |
.Pp |
| 201 |
Time adjustments are made by |
201 |
Time adjustments are made by |
| 202 |
.Nm |
202 |
.Nm |
| 203 |
in one of two |
203 |
in one of two |
| 204 |
ways. |
204 |
ways. |
| 205 |
If |
205 |
If |
| 206 |
.Nm |
206 |
.Nm |
| 207 |
determines the clock is in error more |
207 |
determines the clock is in error more |
| 208 |
than 0.5 second it will simply step the time by calling the system |
208 |
than 0.5 second it will simply step the time by calling the system |
| 209 |
.Xr settimeofday 2 |
209 |
.Xr settimeofday 2 |
|
Lines 215-236
Link Here
|
| 215 |
The latter technique is less disruptive |
215 |
The latter technique is less disruptive |
| 216 |
and more accurate when the error is small, and works quite well |
216 |
and more accurate when the error is small, and works quite well |
| 217 |
when |
217 |
when |
| 218 |
.Nm |
218 |
.Nm |
| 219 |
is run by |
219 |
is run by |
| 220 |
.Xr cron 8 |
220 |
.Xr cron 8 |
| 221 |
every hour or |
221 |
every hour or |
| 222 |
two. |
222 |
two. |
| 223 |
.Pp |
223 |
.Pp |
| 224 |
.Nm |
224 |
.Nm |
| 225 |
will decline to set the date if an NTP server |
225 |
will decline to set the date if an NTP server |
| 226 |
daemon (e.g., |
226 |
daemon (e.g., |
| 227 |
.Xr ntpd 8 ) |
227 |
.Xr ntpd 8 ) |
| 228 |
is running on the same host. |
228 |
is running on the same host. |
| 229 |
When |
229 |
When |
| 230 |
running |
230 |
running |
| 231 |
.Nm |
231 |
.Nm |
| 232 |
on a regular basis from |
232 |
on a regular basis from |
| 233 |
.Xr cron 8 |
233 |
.Xr cron 8 |
| 234 |
as |
234 |
as |
| 235 |
an alternative to running a daemon, doing so once every hour or two |
235 |
an alternative to running a daemon, doing so once every hour or two |
| 236 |
will result in precise enough timekeeping to avoid stepping the |
236 |
will result in precise enough timekeeping to avoid stepping the |
|
Lines 239-250
Link Here
|
| 239 |
If NetInfo support is compiled into |
239 |
If NetInfo support is compiled into |
| 240 |
.Nm , |
240 |
.Nm , |
| 241 |
then the |
241 |
then the |
| 242 |
.Ic server |
242 |
.Ic server |
| 243 |
argument is optional if |
243 |
argument is optional if |
| 244 |
.Nm |
244 |
.Nm |
| 245 |
can find a |
245 |
can find a |
| 246 |
time server in the NetInfo configuration for |
246 |
time server in the NetInfo configuration for |
| 247 |
.Xr ntpd 8 . |
247 |
.Xr ntpd 8 . |
| 248 |
.Sh FILES |
248 |
.Sh FILES |
| 249 |
.Bl -tag -width /etc/ntp.keys -compact |
249 |
.Bl -tag -width /etc/ntp.keys -compact |
| 250 |
.It Pa /etc/ntp.keys |
250 |
.It Pa /etc/ntp.keys |