Deleted Added
full compact
timed.8 (216372) timed.8 (233648)
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 12 unchanged lines hidden (view full) ---

21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\" @(#)timed.8 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1980, 1991, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 12 unchanged lines hidden (view full) ---

21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26.\" SUCH DAMAGE.
27.\"
28.\" @(#)timed.8 8.1 (Berkeley) 6/6/93
29.\" $FreeBSD: head/usr.sbin/timed/timed/timed.8 216372 2010-12-11 09:38:12Z joel $
29.\" $FreeBSD: head/usr.sbin/timed/timed/timed.8 233648 2012-03-29 05:02:12Z eadler $
30.\"
31.Dd February 11, 2008
32.Dt TIMED 8
33.Os
34.Sh NAME
35.Nm timed
36.Nd time server daemon
37.Sh SYNOPSIS

--- 43 unchanged lines hidden (view full) ---

81.It
82.Nm
83will only accept trusted hosts as masters.
84If it finds an untrusted host claiming to be master,
85.Nm
86will suppress incoming messages from that host
87and call for a new election.
88.It
30.\"
31.Dd February 11, 2008
32.Dt TIMED 8
33.Os
34.Sh NAME
35.Nm timed
36.Nd time server daemon
37.Sh SYNOPSIS

--- 43 unchanged lines hidden (view full) ---

81.It
82.Nm
83will only accept trusted hosts as masters.
84If it finds an untrusted host claiming to be master,
85.Nm
86will suppress incoming messages from that host
87and call for a new election.
88.It
89Use real host names (resolvable by RDNS) not aliases (eg in
89Use real host names (resolvable by RDNS) not aliases (eg in
90.Xr named 8
91parlance: use A names, not C names).
92.It
93Use full names eg time1.domain.com not time1.
94.It
95.Fl F
90.Xr named 8
91parlance: use A names, not C names).
92.It
93Use full names eg time1.domain.com not time1.
94.It
95.Fl F
96automatically includes the functionality of
96automatically includes the functionality of
97.Fl M
98(so
99.Fl M
100does not need to asserted).
101.It
97.Fl M
98(so
99.Fl M
100does not need to asserted).
101.It
102If
102If
103.Fl F
104is not specified,
105all hosts on connected networks are treated as trustworthy.
106.El
107.It Fl M
108Allow this host to become a
109.Nm
110master if necessary.

--- 178 unchanged lines hidden ---
103.Fl F
104is not specified,
105all hosts on connected networks are treated as trustworthy.
106.El
107.It Fl M
108Allow this host to become a
109.Nm
110master if necessary.

--- 178 unchanged lines hidden ---