View | Details | Raw Unified | Return to bug 33179
Collapse All | Expand All

(-)ntpdate-mod.8 (-39 / +39 lines)
Lines 22-42 Link Here
22
.Em Note :
22
.Em Note :
23
The functionality of this program is now available
23
The functionality of this program is now available
24
in the
24
in the
25
.Xr ntpd 8   
25
.Xr ntpd 8
26
program.
26
program.
27
See the
27
See the
28
.Fl q   
28
.Fl q
29
command line
29
command line
30
option in the
30
option in the
31
.Xr ntpd 8   
31
.Xr ntpd 8
32
page.
32
page.
33
After a suitable period of
33
After a suitable period of
34
mourning, the
34
mourning, the
35
.Nm   
35
.Nm
36
program is to be retired from this
36
program is to be retired from this
37
distribution.
37
distribution.
38
.Pp
38
.Pp
39
.Nm   
39
.Nm
40
sets the local date and time by polling the
40
sets the local date and time by polling the
41
Network Time Protocol (NTP) server(s) given as the
41
Network Time Protocol (NTP) server(s) given as the
42
.Ar server
42
.Ar server
Lines 48-54 Link Here
48
selection algorithms are applied to select the best of these.
48
selection algorithms are applied to select the best of these.
49
Note
49
Note
50
that the accuracy and reliability of
50
that the accuracy and reliability of
51
.Nm   
51
.Nm
52
depends on
52
depends on
53
the number of servers, the number of polls each time it is run and
53
the number of servers, the number of polls each time it is run and
54
the interval between runs.
54
the interval between runs.
Lines 58-64 Link Here
58
.It Fl a Ar key
58
.It Fl a Ar key
59
Enable the authentication function and specify the key
59
Enable the authentication function and specify the key
60
identifier to be used for authentication as the argument
60
identifier to be used for authentication as the argument
61
.Ar key
61
.Ar key .
62
The keys and key identifiers must match
62
The keys and key identifiers must match
63
in both the client and server key files.
63
in both the client and server key files.
64
The default is to disable
64
The default is to disable
Lines 74-82 Link Here
74
if the offset is
74
if the offset is
75
greater than +-128 ms.
75
greater than +-128 ms.
76
Note that, if the offset is much greater
76
Note that, if the offset is much greater
77
than +-128 ms in this case, that it can take a long time (hours) to
77
than +-128 ms in this case, it can take a long time (hours) to
78
slew the clock to the correct value.
78
slew the clock to the correct value.
79
During this time. the host
79
During this time, the host
80
should not be used to synchronize clients.
80
should not be used to synchronize clients.
81
.It Fl b
81
.It Fl b
82
Force the time to be stepped using the
82
Force the time to be stepped using the
Lines 89-95 Link Here
89
time.
89
time.
90
.It Fl d
90
.It Fl d
91
Enable the debugging mode, in which
91
Enable the debugging mode, in which
92
.Nm   
92
.Nm
93
will go
93
will go
94
through all the steps, but not adjust the local clock.
94
through all the steps, but not adjust the local clock.
95
Information
95
Information
Lines 100-106 Link Here
100
.Ar authdelay ,
100
.Ar authdelay ,
101
in seconds and fraction
101
in seconds and fraction
102
(see
102
(see
103
.Xr ntpd 8   
103
.Xr ntpd 8
104
for details).
104
for details).
105
This number is usually small
105
This number is usually small
106
enough to be negligible for most purposes, though specifying a
106
enough to be negligible for most purposes, though specifying a
Lines 112-125 Link Here
112
.Pa /etc/ntp.keys .
112
.Pa /etc/ntp.keys .
113
This file
113
This file
114
should be in the format described in
114
should be in the format described in
115
.Xr ntpd 8  . 
115
.Xr ntpd 8 .
116
.It Fl o Ar version
116
.It Fl o Ar version
117
Specify the NTP version for outgoint packets as the integer
117
Specify the NTP version for outgoint packets as the integer
118
.Ar version ,
118
.Ar version ,
119
which can be 1 or 2.
119
which can be 1 or 2.
120
The default is 3.
120
The default is 3.
121
This allows
121
This allows
122
.Nm   
122
.Nm
123
to be used with older NTP versions.
123
to be used with older NTP versions.
124
.It Fl p Ar samples
124
.It Fl p Ar samples
125
Specify the number of samples to be acquired from each server
125
Specify the number of samples to be acquired from each server
Lines 132-162 Link Here
132
.It Fl s
132
.It Fl s
133
Divert logging output from the standard output (default) to the
133
Divert logging output from the standard output (default) to the
134
system
134
system
135
.Xr syslog 3   
135
.Xr syslog 3
136
facility.
136
facility.
137
This is designed primarily for
137
This is designed primarily for
138
convenience of
138
convenience of
139
.Xr cron 8   
139
.Xr cron 8
140
scripts.
140
scripts.
141
.It Fl t Ar timeout
141
.It Fl t Ar timeout
142
Specify the maximum time waiting for a server response as the
142
Specify the maximum time waiting for a server response as the
143
value
143
value
144
.Ar timeout ,
144
.Ar timeout ,
145
in seconds and fraction.
145
in seconds and fraction.
146
The value is is
146
The value is
147
rounded to a multiple of 0.2 seconds.
147
rounded to a multiple of 0.2 seconds.
148
The default is 1 second, a
148
The default is 1 second, a
149
value suitable for polling across a LAN.
149
value suitable for polling across a LAN.
150
.It Fl u
150
.It Fl u
151
Direct
151
Direct
152
.Nm   
152
.Nm
153
to use an unprivileged port or outgoing
153
to use an unprivileged port for outgoing
154
packets.
154
packets.
155
This is most useful when behind a firewall that blocks
155
This is most useful when behind a firewall that blocks
156
incoming traffic to privileged ports, and you want to synchronise
156
incoming traffic to privileged ports, and you want to synchronise
157
with hosts beyond the firewall.
157
with hosts beyond the firewall.
158
Note that the
158
Note that the
159
.Fl d   
159
.Fl d
160
option
160
option
161
always uses unprivileged ports.
161
always uses unprivileged ports.
162
.It Fl v
162
.It Fl v
Lines 167-209 Link Here
167
identification string to be logged.
167
identification string to be logged.
168
.El
168
.El
169
.Pp
169
.Pp
170
.Nm   
170
.Nm
171
can be run manually as necessary to set the
171
can be run manually as necessary to set the
172
host clock, or it can be run from the host startup script to set
172
host clock, or it can be run from the host startup script to set
173
the clock at boot time.
173
the clock at boot time.
174
This is useful in some cases to set the
174
This is useful in some cases to set the
175
clock initially before starting the NTP daemon
175
clock initially before starting the NTP daemon
176
.Xr ntpd 8  . 
176
.Xr ntpd 8 .
177
It is
177
It is
178
also possible to run
178
also possible to run
179
.Nm   
179
.Nm
180
from a
180
from a
181
.Xr cron 8   
181
.Xr cron 8
182
script.
182
script.
183
However, it is important to note that
183
However, it is important to note that
184
.Nm   
184
.Nm
185
with
185
with
186
contrived
186
contrived
187
.Xr cron 8   
187
.Xr cron 8
188
scripts is no substitute for the NTP
188
scripts is no substitute for the NTP
189
daemon, which uses sophisticated algorithms to maximize accuracy
189
daemon, which uses sophisticated algorithms to maximize accuracy
190
and reliability while minimizing resource use.
190
and reliability while minimizing resource use.
191
Finally, since
191
Finally, since
192
.Nm   
192
.Nm
193
does not discipline the host clock frequency as
193
does not discipline the host clock frequency as
194
does
194
does
195
.Xr ntpd 8  , 
195
.Xr ntpd 8 ,
196
the accuracy using
196
the accuracy using
197
.Nm   
197
.Nm
198
is
198
is
199
limited.
199
limited.
200
.Pp
200
.Pp
201
Time adjustments are made by
201
Time adjustments are made by
202
.Nm   
202
.Nm
203
in one of two
203
in one of two
204
ways.
204
ways.
205
If
205
If
206
.Nm   
206
.Nm
207
determines the clock is in error more
207
determines the clock is in error more
208
than 0.5 second it will simply step the time by calling the system
208
than 0.5 second it will simply step the time by calling the system
209
.Xr settimeofday 2
209
.Xr settimeofday 2
Lines 215-236 Link Here
215
The latter technique is less disruptive
215
The latter technique is less disruptive
216
and more accurate when the error is small, and works quite well
216
and more accurate when the error is small, and works quite well
217
when
217
when
218
.Nm   
218
.Nm
219
is run by
219
is run by
220
.Xr cron 8   
220
.Xr cron 8
221
every hour or
221
every hour or
222
two.
222
two.
223
.Pp
223
.Pp
224
.Nm   
224
.Nm
225
will decline to set the date if an NTP server
225
will decline to set the date if an NTP server
226
daemon (e.g.,
226
daemon (e.g.,
227
.Xr ntpd 8 )  
227
.Xr ntpd 8 )
228
is running on the same host.
228
is running on the same host.
229
When
229
When
230
running
230
running
231
.Nm   
231
.Nm
232
on a regular basis from
232
on a regular basis from
233
.Xr cron 8   
233
.Xr cron 8
234
as
234
as
235
an alternative to running a daemon, doing so once every hour or two
235
an alternative to running a daemon, doing so once every hour or two
236
will result in precise enough timekeeping to avoid stepping the
236
will result in precise enough timekeeping to avoid stepping the
Lines 239-250 Link Here
239
If NetInfo support is compiled into
239
If NetInfo support is compiled into
240
.Nm , 
240
.Nm , 
241
then the
241
then the
242
.Ic server   
242
.Ic server
243
argument is optional if
243
argument is optional if
244
.Nm   
244
.Nm
245
can find a
245
can find a
246
time server in the NetInfo configuration for
246
time server in the NetInfo configuration for
247
.Xr ntpd 8  . 
247
.Xr ntpd 8 .
248
.Sh FILES
248
.Sh FILES
249
.Bl -tag -width /etc/ntp.keys -compact
249
.Bl -tag -width /etc/ntp.keys -compact
250
.It Pa /etc/ntp.keys
250
.It Pa /etc/ntp.keys

Return to bug 33179