ntp.conf.def (294554) | ntp.conf.def (298695) |
---|---|
1/* -*- Mode: Text -*- */ 2 3autogen definitions options; 4 5#include copyright.def 6 7// We want the synopsis to be "/etc/ntp.conf" but we need the prog-name 8// to be ntp.conf - the latter is also how autogen produces the output --- 99 unchanged lines hidden (view full) --- 108only those options applicable to each command are listed below. 109Use 110of options not listed may not be caught as an error, but may result 111in some weird and even destructive behavior. 112.Pp 113If the Basic Socket Interface Extensions for IPv6 (RFC-2553) 114is detected, support for the IPv6 address family is generated 115in addition to the default support of the IPv4 address family. | 1/* -*- Mode: Text -*- */ 2 3autogen definitions options; 4 5#include copyright.def 6 7// We want the synopsis to be "/etc/ntp.conf" but we need the prog-name 8// to be ntp.conf - the latter is also how autogen produces the output --- 99 unchanged lines hidden (view full) --- 108only those options applicable to each command are listed below. 109Use 110of options not listed may not be caught as an error, but may result 111in some weird and even destructive behavior. 112.Pp 113If the Basic Socket Interface Extensions for IPv6 (RFC-2553) 114is detected, support for the IPv6 address family is generated 115in addition to the default support of the IPv4 address family. |
116In a few cases, including the reslist billboard generated 117by ntpdc, IPv6 addresses are automatically generated. | 116In a few cases, including the 117.Cm reslist 118billboard generated 119by 120.Xr ntpq 1ntpqmdoc 121or 122.Xr ntpdc 1ntpdcmdoc , 123IPv6 addresses are automatically generated. |
118IPv6 addresses can be identified by the presence of colons 119.Dq \&: 120in the address field. 121IPv6 addresses can be used almost everywhere where 122IPv4 addresses can be used, 123with the exception of reference clock addresses, 124which are always IPv4. 125.Pp --- 18 unchanged lines hidden (view full) --- 144.It Xo Ic server Ar address 145.Op Cm key Ar key \&| Cm autokey 146.Op Cm burst 147.Op Cm iburst 148.Op Cm version Ar version 149.Op Cm prefer 150.Op Cm minpoll Ar minpoll 151.Op Cm maxpoll Ar maxpoll | 124IPv6 addresses can be identified by the presence of colons 125.Dq \&: 126in the address field. 127IPv6 addresses can be used almost everywhere where 128IPv4 addresses can be used, 129with the exception of reference clock addresses, 130which are always IPv4. 131.Pp --- 18 unchanged lines hidden (view full) --- 150.It Xo Ic server Ar address 151.Op Cm key Ar key \&| Cm autokey 152.Op Cm burst 153.Op Cm iburst 154.Op Cm version Ar version 155.Op Cm prefer 156.Op Cm minpoll Ar minpoll 157.Op Cm maxpoll Ar maxpoll |
158.Op Cm true |
|
152.Xc 153.It Xo Ic peer Ar address 154.Op Cm key Ar key \&| Cm autokey 155.Op Cm version Ar version 156.Op Cm prefer 157.Op Cm minpoll Ar minpoll 158.Op Cm maxpoll Ar maxpoll | 159.Xc 160.It Xo Ic peer Ar address 161.Op Cm key Ar key \&| Cm autokey 162.Op Cm version Ar version 163.Op Cm prefer 164.Op Cm minpoll Ar minpoll 165.Op Cm maxpoll Ar maxpoll |
166.Op Cm true 167.Op Cm xleave |
|
159.Xc 160.It Xo Ic broadcast Ar address 161.Op Cm key Ar key \&| Cm autokey 162.Op Cm version Ar version 163.Op Cm prefer 164.Op Cm minpoll Ar minpoll 165.Op Cm ttl Ar ttl | 168.Xc 169.It Xo Ic broadcast Ar address 170.Op Cm key Ar key \&| Cm autokey 171.Op Cm version Ar version 172.Op Cm prefer 173.Op Cm minpoll Ar minpoll 174.Op Cm ttl Ar ttl |
175.Op Cm xleave |
|
166.Xc 167.It Xo Ic manycastclient Ar address 168.Op Cm key Ar key \&| Cm autokey 169.Op Cm version Ar version 170.Op Cm prefer 171.Op Cm minpoll Ar minpoll 172.Op Cm maxpoll Ar maxpoll 173.Op Cm ttl Ar ttl --- 109 unchanged lines hidden (view full) --- 283include authentication fields encrypted using the autokey scheme 284described in 285.Sx Authentication Options . 286.It Cm burst 287when the server is reachable, send a burst of eight packets 288instead of the usual one. 289The packet spacing is normally 2 s; 290however, the spacing between the first and second packets | 176.Xc 177.It Xo Ic manycastclient Ar address 178.Op Cm key Ar key \&| Cm autokey 179.Op Cm version Ar version 180.Op Cm prefer 181.Op Cm minpoll Ar minpoll 182.Op Cm maxpoll Ar maxpoll 183.Op Cm ttl Ar ttl --- 109 unchanged lines hidden (view full) --- 293include authentication fields encrypted using the autokey scheme 294described in 295.Sx Authentication Options . 296.It Cm burst 297when the server is reachable, send a burst of eight packets 298instead of the usual one. 299The packet spacing is normally 2 s; 300however, the spacing between the first and second packets |
291can be changed with the calldelay command to allow | 301can be changed with the 302.Ic calldelay 303command to allow |
292additional time for a modem or ISDN call to complete. 293This is designed to improve timekeeping quality 294with the 295.Ic server 296command and s addresses. 297.It Cm iburst 298When the server is unreachable, send a burst of eight packets 299instead of the usual one. 300The packet spacing is normally 2 s; 301however, the spacing between the first two packets can be | 304additional time for a modem or ISDN call to complete. 305This is designed to improve timekeeping quality 306with the 307.Ic server 308command and s addresses. 309.It Cm iburst 310When the server is unreachable, send a burst of eight packets 311instead of the usual one. 312The packet spacing is normally 2 s; 313however, the spacing between the first two packets can be |
302changed with the calldelay command to allow | 314changed with the 315.Ic calldelay 316command to allow |
303additional time for a modem or ISDN call to complete. 304This is designed to speed the initial synchronization 305acquisition with the 306.Ic server 307command and s addresses and when 308.Xr ntpd 1ntpdmdoc 309is started with the 310.Fl q --- 16 unchanged lines hidden (view full) --- 327The 328minimum poll interval defaults to 6 (64 s), but can be decreased by 329the 330.Cm minpoll 331option to a lower limit of 4 (16 s). 332.It Cm noselect 333Marks the server as unused, except for display purposes. 334The server is discarded by the selection algroithm. | 317additional time for a modem or ISDN call to complete. 318This is designed to speed the initial synchronization 319acquisition with the 320.Ic server 321command and s addresses and when 322.Xr ntpd 1ntpdmdoc 323is started with the 324.Fl q --- 16 unchanged lines hidden (view full) --- 341The 342minimum poll interval defaults to 6 (64 s), but can be decreased by 343the 344.Cm minpoll 345option to a lower limit of 4 (16 s). 346.It Cm noselect 347Marks the server as unused, except for display purposes. 348The server is discarded by the selection algroithm. |
349.It Cm preempt 350Says the association can be preempted. 351.It Cm true 352Marks the server as a truechimer. 353Use this option only for testing. |
|
335.It Cm prefer 336Marks the server as preferred. 337All other things being equal, 338this host will be chosen for synchronization among a set of 339correctly operating hosts. 340See the 341.Qq Mitigation Rules and the prefer Keyword 342page 343(available as part of the HTML documentation 344provided in 345.Pa /usr/share/doc/ntp ) 346for further information. | 354.It Cm prefer 355Marks the server as preferred. 356All other things being equal, 357this host will be chosen for synchronization among a set of 358correctly operating hosts. 359See the 360.Qq Mitigation Rules and the prefer Keyword 361page 362(available as part of the HTML documentation 363provided in 364.Pa /usr/share/doc/ntp ) 365for further information. |
366.It Cm true 367Forces the association to always survive the selection and clustering algorithms. 368This option should almost certainly 369.Em only 370be used while testing an association. |
|
347.It Cm ttl Ar ttl 348This option is used only with broadcast server and manycast 349client modes. 350It specifies the time-to-live 351.Ar ttl 352to 353use on broadcast server and multicast server and the maximum 354.Ar ttl 355for the expanding ring search with manycast 356client packets. 357Selection of the proper value, which defaults to 358127, is something of a black art and should be coordinated with the 359network administrator. 360.It Cm version Ar version 361Specifies the version number to be used for outgoing NTP 362packets. 363Versions 1-4 are the choices, with version 4 the 364default. | 371.It Cm ttl Ar ttl 372This option is used only with broadcast server and manycast 373client modes. 374It specifies the time-to-live 375.Ar ttl 376to 377use on broadcast server and multicast server and the maximum 378.Ar ttl 379for the expanding ring search with manycast 380client packets. 381Selection of the proper value, which defaults to 382127, is something of a black art and should be coordinated with the 383network administrator. 384.It Cm version Ar version 385Specifies the version number to be used for outgoing NTP 386packets. 387Versions 1-4 are the choices, with version 4 the 388default. |
389.It Cm xleave 390Valid in 391.Cm peer 392and 393.Cm broadcast 394modes only, this flag enables interleave mode. |
|
365.El 366.Ss Auxiliary Commands 367.Bl -tag -width indent 368.It Ic broadcastclient 369This command enables reception of broadcast server messages to 370any local interface (type b) address. 371Upon receiving a message for 372the first time, the broadcast client measures the nominal server --- 129 unchanged lines hidden (view full) --- 502remote configuration commands require cryptographic authentication. 503This flag can be set or reset by the 504.Ic enable 505and 506.Ic disable 507commands and also by remote 508configuration commands sent by a 509.Xr ntpdc 1ntpdcmdoc | 395.El 396.Ss Auxiliary Commands 397.Bl -tag -width indent 398.It Ic broadcastclient 399This command enables reception of broadcast server messages to 400any local interface (type b) address. 401Upon receiving a message for 402the first time, the broadcast client measures the nominal server --- 129 unchanged lines hidden (view full) --- 532remote configuration commands require cryptographic authentication. 533This flag can be set or reset by the 534.Ic enable 535and 536.Ic disable 537commands and also by remote 538configuration commands sent by a 539.Xr ntpdc 1ntpdcmdoc |
510program running in | 540program running on |
511another machine. 512If this flag is enabled, which is the default 513case, new broadcast client and symmetric passive associations and 514remote configuration commands must be cryptographically 515authenticated using either symmetric key or public key cryptography. 516If this 517flag is disabled, these operations are effective 518even if not cryptographic --- 173 unchanged lines hidden (view full) --- 692However, this is not to say that DNS aliases, different names 693for each interface, etc., are constrained in any way. 694.Pp 695It is also important to note that Autokey verifies authenticity 696using the host name, network address and public keys, 697all of which are bound together by the protocol specifically 698to deflect masquerade attacks. 699For this reason Autokey | 541another machine. 542If this flag is enabled, which is the default 543case, new broadcast client and symmetric passive associations and 544remote configuration commands must be cryptographically 545authenticated using either symmetric key or public key cryptography. 546If this 547flag is disabled, these operations are effective 548even if not cryptographic --- 173 unchanged lines hidden (view full) --- 722However, this is not to say that DNS aliases, different names 723for each interface, etc., are constrained in any way. 724.Pp 725It is also important to note that Autokey verifies authenticity 726using the host name, network address and public keys, 727all of which are bound together by the protocol specifically 728to deflect masquerade attacks. 729For this reason Autokey |
700includes the source and destinatino IP addresses in message digest | 730includes the source and destination IP addresses in message digest |
701computations and so the same addresses must be available 702at both the server and client. 703For this reason operation 704with network address translation schemes is not possible. 705This reflects the intended robust security model where government 706and corporate NTP servers are operated outside firewall perimeters. 707.Ss Operation 708A specific combination of authentication scheme (none, --- 181 unchanged lines hidden (view full) --- 890in the keys directory. 891.It Cm host Ar file 892Specifies the location of the required host key file. 893This overrides 894the link 895.Pa ntpkey_key_ Ns Ar hostname 896in the keys directory. 897.It Cm iffpar Ar file | 731computations and so the same addresses must be available 732at both the server and client. 733For this reason operation 734with network address translation schemes is not possible. 735This reflects the intended robust security model where government 736and corporate NTP servers are operated outside firewall perimeters. 737.Ss Operation 738A specific combination of authentication scheme (none, --- 181 unchanged lines hidden (view full) --- 920in the keys directory. 921.It Cm host Ar file 922Specifies the location of the required host key file. 923This overrides 924the link 925.Pa ntpkey_key_ Ns Ar hostname 926in the keys directory. 927.It Cm iffpar Ar file |
898Specifies the location of the optional IFF parameters file.This 899overrides the link | 928Specifies the location of the optional IFF parameters file. 929This overrides the link |
900.Pa ntpkey_iff_ Ns Ar hostname 901in the keys directory. 902.It Cm leap Ar file 903Specifies the location of the optional leapsecond file. 904This overrides the link 905.Pa ntpkey_leap 906in the keys directory. 907.It Cm mvpar Ar file 908Specifies the location of the optional MV parameters file. | 930.Pa ntpkey_iff_ Ns Ar hostname 931in the keys directory. 932.It Cm leap Ar file 933Specifies the location of the optional leapsecond file. 934This overrides the link 935.Pa ntpkey_leap 936in the keys directory. 937.It Cm mvpar Ar file 938Specifies the location of the optional MV parameters file. |
909This 910overrides the link | 939This overrides the link |
911.Pa ntpkey_mv_ Ns Ar hostname 912in the keys directory. 913.It Cm pw Ar password 914Specifies the password to decrypt files containing private keys and 915identity parameters. 916This is required only if these files have been 917encrypted. 918.It Cm randfile Ar file --- 124 unchanged lines hidden (view full) --- 1043See the 1044.Ic statistics 1045command below 1046for a listing and example of each type of statistics currently 1047supported. 1048Statistic files are managed using file generation sets 1049and scripts in the 1050.Pa ./scripts | 940.Pa ntpkey_mv_ Ns Ar hostname 941in the keys directory. 942.It Cm pw Ar password 943Specifies the password to decrypt files containing private keys and 944identity parameters. 945This is required only if these files have been 946encrypted. 947.It Cm randfile Ar file --- 124 unchanged lines hidden (view full) --- 1072See the 1073.Ic statistics 1074command below 1075for a listing and example of each type of statistics currently 1076supported. 1077Statistic files are managed using file generation sets 1078and scripts in the 1079.Pa ./scripts |
1051directory of this distribution. | 1080directory of the source code distribution. |
1052Using 1053these facilities and 1054.Ux 1055.Xr cron 8 1056jobs, the data can be 1057automatically summarized and archived for retrospective analysis. 1058.Ss Monitoring Commands 1059.Bl -tag -width indent --- 317 unchanged lines hidden (view full) --- 1377.Cm nolink . 1378If link is specified, a 1379hard link from the current file set element to a file without 1380suffix is created. 1381When there is already a file with this name and 1382the number of links of this file is one, it is renamed appending a 1383dot, the letter 1384.Cm C , | 1081Using 1082these facilities and 1083.Ux 1084.Xr cron 8 1085jobs, the data can be 1086automatically summarized and archived for retrospective analysis. 1087.Ss Monitoring Commands 1088.Bl -tag -width indent --- 317 unchanged lines hidden (view full) --- 1406.Cm nolink . 1407If link is specified, a 1408hard link from the current file set element to a file without 1409suffix is created. 1410When there is already a file with this name and 1411the number of links of this file is one, it is renamed appending a 1412dot, the letter 1413.Cm C , |
1385and the pid of the ntpd server process. | 1414and the pid of the 1415.Xr ntpd 1ntpdmdoc 1416server process. |
1386When the 1387number of links is greater than one, the file is unlinked. 1388This 1389allows the current file to be accessed by a constant name. 1390.It Cm enable \&| Cm disable 1391Enables or disables the recording function. 1392.El 1393.El --- 26 unchanged lines hidden (view full) --- 1420While this facility may 1421be useful for keeping unwanted or broken or malicious clients 1422from congesting innocent servers, it should not be considered 1423an alternative to the NTP authentication facilities. 1424Source address based restrictions are easily circumvented 1425by a determined cracker. 1426.Pp 1427Clients can be denied service because they are explicitly | 1417When the 1418number of links is greater than one, the file is unlinked. 1419This 1420allows the current file to be accessed by a constant name. 1421.It Cm enable \&| Cm disable 1422Enables or disables the recording function. 1423.El 1424.El --- 26 unchanged lines hidden (view full) --- 1451While this facility may 1452be useful for keeping unwanted or broken or malicious clients 1453from congesting innocent servers, it should not be considered 1454an alternative to the NTP authentication facilities. 1455Source address based restrictions are easily circumvented 1456by a determined cracker. 1457.Pp 1458Clients can be denied service because they are explicitly |
1428included in the restrict list created by the restrict command | 1459included in the restrict list created by the 1460.Ic restrict 1461command |
1429or implicitly as the result of cryptographic or rate limit 1430violations. 1431Cryptographic violations include certificate 1432or identity verification failure; rate limit violations generally 1433result from defective NTP implementations that send packets 1434at abusive rates. 1435Some violations cause denied service 1436only for the offending packet, others cause denied service 1437for a timed period and others cause the denied service for | 1462or implicitly as the result of cryptographic or rate limit 1463violations. 1464Cryptographic violations include certificate 1465or identity verification failure; rate limit violations generally 1466result from defective NTP implementations that send packets 1467at abusive rates. 1468Some violations cause denied service 1469only for the offending packet, others cause denied service 1470for a timed period and others cause the denied service for |
1438an indefinate period. | 1471an indefinite period. |
1439When a client or network is denied access | 1472When a client or network is denied access |
1440for an indefinate period, the only way at present to remove | 1473for an indefinite period, the only way at present to remove |
1441the restrictions is by restarting the server. 1442.Ss The Kiss-of-Death Packet 1443Ordinarily, packets denied service are simply dropped with no 1444further action except incrementing statistics counters. 1445Sometimes a 1446more proactive response is needed, such as a server message that 1447explicitly requests the client to stop sending and leave a message 1448for the system operator. --- 41 unchanged lines hidden (view full) --- 1490subcommand specifies the minimum average packet 1491spacing, while the 1492.Cm minimum 1493subcommand specifies the minimum packet spacing. 1494Packets that violate these minima are discarded 1495and a kiss-o'-death packet returned if enabled. 1496The default 1497minimum average and minimum are 5 and 2, respectively. | 1474the restrictions is by restarting the server. 1475.Ss The Kiss-of-Death Packet 1476Ordinarily, packets denied service are simply dropped with no 1477further action except incrementing statistics counters. 1478Sometimes a 1479more proactive response is needed, such as a server message that 1480explicitly requests the client to stop sending and leave a message 1481for the system operator. --- 41 unchanged lines hidden (view full) --- 1523subcommand specifies the minimum average packet 1524spacing, while the 1525.Cm minimum 1526subcommand specifies the minimum packet spacing. 1527Packets that violate these minima are discarded 1528and a kiss-o'-death packet returned if enabled. 1529The default 1530minimum average and minimum are 5 and 2, respectively. |
1498The monitor subcommand specifies the probability of discard | 1531The 1532.Ic monitor 1533subcommand specifies the probability of discard |
1499for packets that overflow the rate-control window. 1500.It Xo Ic restrict address 1501.Op Cm mask Ar mask 1502.Op Ar flag ... 1503.Xc 1504The 1505.Ar address 1506argument expressed in --- 42 unchanged lines hidden (view full) --- 1549If this flag is set when an access violation occurs, a kiss-o'-death 1550(KoD) packet is sent. 1551KoD packets are rate limited to no more than one 1552per second. 1553If another KoD packet occurs within one second after the 1554last one, the packet is dropped. 1555.It Cm limited 1556Deny service if the packet spacing violates the lower limits specified | 1534for packets that overflow the rate-control window. 1535.It Xo Ic restrict address 1536.Op Cm mask Ar mask 1537.Op Ar flag ... 1538.Xc 1539The 1540.Ar address 1541argument expressed in --- 42 unchanged lines hidden (view full) --- 1584If this flag is set when an access violation occurs, a kiss-o'-death 1585(KoD) packet is sent. 1586KoD packets are rate limited to no more than one 1587per second. 1588If another KoD packet occurs within one second after the 1589last one, the packet is dropped. 1590.It Cm limited 1591Deny service if the packet spacing violates the lower limits specified |
1557in the discard command. | 1592in the 1593.Ic discard 1594command. |
1558A history of clients is kept using the 1559monitoring capability of 1560.Xr ntpd 1ntpdmdoc . 1561Thus, monitoring is always active as 1562long as there is a restriction entry with the 1563.Cm limited 1564flag. 1565.It Cm lowpriotrap --- 43 unchanged lines hidden (view full) --- 1609Deny all packets except 1610.Xr ntpq 1ntpqmdoc 1611and 1612.Xr ntpdc 1ntpdcmdoc 1613queries. 1614.It Cm notrap 1615Decline to provide mode 6 control message trap service to matching 1616hosts. | 1595A history of clients is kept using the 1596monitoring capability of 1597.Xr ntpd 1ntpdmdoc . 1598Thus, monitoring is always active as 1599long as there is a restriction entry with the 1600.Cm limited 1601flag. 1602.It Cm lowpriotrap --- 43 unchanged lines hidden (view full) --- 1646Deny all packets except 1647.Xr ntpq 1ntpqmdoc 1648and 1649.Xr ntpdc 1ntpdcmdoc 1650queries. 1651.It Cm notrap 1652Decline to provide mode 6 control message trap service to matching 1653hosts. |
1617The trap service is a subsystem of the ntpdq control message | 1654The trap service is a subsystem of the 1655.Xr ntpq 1ntpqmdoc 1656control message |
1618protocol which is intended for use by remote event logging programs. 1619.It Cm notrust 1620Deny service unless the packet is cryptographically authenticated. 1621.It Cm ntpport 1622This is actually a match algorithm modifier, rather than a 1623restriction flag. 1624Its presence causes the restriction entry to be 1625matched only if the source port in the packet is the standard NTP --- 50 unchanged lines hidden (view full) --- 1676large key sizes. 1677It is implemented using the Autokey protocol and 1678the OpenSSL cryptographic library available from 1679.Li http://www.openssl.org/ . 1680The library can also be used with other NTPv4 modes 1681as well and is highly recommended, especially for broadcast modes. 1682.Pp 1683A persistent manycast client association is configured | 1657protocol which is intended for use by remote event logging programs. 1658.It Cm notrust 1659Deny service unless the packet is cryptographically authenticated. 1660.It Cm ntpport 1661This is actually a match algorithm modifier, rather than a 1662restriction flag. 1663Its presence causes the restriction entry to be 1664matched only if the source port in the packet is the standard NTP --- 50 unchanged lines hidden (view full) --- 1715large key sizes. 1716It is implemented using the Autokey protocol and 1717the OpenSSL cryptographic library available from 1718.Li http://www.openssl.org/ . 1719The library can also be used with other NTPv4 modes 1720as well and is highly recommended, especially for broadcast modes. 1721.Pp 1722A persistent manycast client association is configured |
1684using the manycastclient command, which is similar to the 1685server command but with a multicast (IPv4 class | 1723using the 1724.Ic manycastclient 1725command, which is similar to the 1726.Ic server 1727command but with a multicast (IPv4 class |
1686.Cm D 1687or IPv6 prefix 1688.Cm FF ) 1689group address. 1690The IANA has designated IPv4 address 224.1.1.1 1691and IPv6 address FF05::101 (site local) for NTP. 1692When more servers are needed, it broadcasts manycast 1693client messages to this address at the minimum feasible rate --- 53 unchanged lines hidden (view full) --- 1747which starts out at the 1748.Cm minpoll 1749value specified in the 1750.Ic manycastclient , 1751command and, under normal circumstances, increments to the 1752.Cm maxpolll 1753value specified in this command. 1754Initially, the TTL is | 1728.Cm D 1729or IPv6 prefix 1730.Cm FF ) 1731group address. 1732The IANA has designated IPv4 address 224.1.1.1 1733and IPv6 address FF05::101 (site local) for NTP. 1734When more servers are needed, it broadcasts manycast 1735client messages to this address at the minimum feasible rate --- 53 unchanged lines hidden (view full) --- 1789which starts out at the 1790.Cm minpoll 1791value specified in the 1792.Ic manycastclient , 1793command and, under normal circumstances, increments to the 1794.Cm maxpolll 1795value specified in this command. 1796Initially, the TTL is |
1755set at the minimum hops specified by the ttl command. | 1797set at the minimum hops specified by the 1798.Ic ttl 1799command. |
1756At each retransmission the TTL is increased until reaching 1757the maximum hops specified by this command or a sufficient 1758number client associations have been found. 1759Further retransmissions use the same TTL. 1760.Pp 1761The quality and reliability of the suite of associations 1762discovered by the manycast client is determined by the NTP 1763mitigation algorithms and the --- 621 unchanged lines hidden (view full) --- 2385this file to replace the old version. 2386This implies that 2387.Xr ntpd 1ntpdmdoc 2388must have write permission for the directory the 2389drift file is located in, and that file system links, symbolic or 2390otherwise, should be avoided. 2391.It Ic dscp Ar value 2392This option specifies the Differentiated Services Control Point (DSCP) value, | 1800At each retransmission the TTL is increased until reaching 1801the maximum hops specified by this command or a sufficient 1802number client associations have been found. 1803Further retransmissions use the same TTL. 1804.Pp 1805The quality and reliability of the suite of associations 1806discovered by the manycast client is determined by the NTP 1807mitigation algorithms and the --- 621 unchanged lines hidden (view full) --- 2429this file to replace the old version. 2430This implies that 2431.Xr ntpd 1ntpdmdoc 2432must have write permission for the directory the 2433drift file is located in, and that file system links, symbolic or 2434otherwise, should be avoided. 2435.It Ic dscp Ar value 2436This option specifies the Differentiated Services Control Point (DSCP) value, |
2393a 6-bit code. The default value is 46, signifying Expedited Forwarding. | 2437a 6-bit code. 2438The default value is 46, signifying Expedited Forwarding. |
2394.It Xo Ic enable 2395.Oo 2396.Cm auth | Cm bclient | 2397.Cm calibrate | Cm kernel | 2398.Cm mode7 | Cm monitor | 2399.Cm ntp | Cm stats | 2400.Cm unpeer_crypto_early | Cm unpeer_crypto_nak_early | Cm unpeer_digest_early 2401.Oc --- 222 unchanged lines hidden (view full) --- 2624the event class. 2625The 2626.Cm all 2627prefix can be used instead of a message class. 2628A 2629message class may also be followed by the 2630.Cm all 2631keyword to enable/disable all | 2439.It Xo Ic enable 2440.Oo 2441.Cm auth | Cm bclient | 2442.Cm calibrate | Cm kernel | 2443.Cm mode7 | Cm monitor | 2444.Cm ntp | Cm stats | 2445.Cm unpeer_crypto_early | Cm unpeer_crypto_nak_early | Cm unpeer_digest_early 2446.Oc --- 222 unchanged lines hidden (view full) --- 2669the event class. 2670The 2671.Cm all 2672prefix can be used instead of a message class. 2673A 2674message class may also be followed by the 2675.Cm all 2676keyword to enable/disable all |
2632messages of the respective message class.Thus, a minimal log configuration | 2677messages of the respective message class. 2678Thus, a minimal log configuration |
2633could look like this: 2634.Bd -literal 2635logconfig =syncstatus +sysevents 2636.Ed 2637.Pp 2638This would just list the synchronizations state of 2639.Xr ntpd 1ntpdmdoc 2640and the major system events. --- 7 unchanged lines hidden (view full) --- 2648synchronization information. 2649All other events and messages about 2650peers, system events and so on is suppressed. 2651.It Ic logfile Ar logfile 2652This command specifies the location of an alternate log file to 2653be used instead of the default system 2654.Xr syslog 3 2655facility. | 2679could look like this: 2680.Bd -literal 2681logconfig =syncstatus +sysevents 2682.Ed 2683.Pp 2684This would just list the synchronizations state of 2685.Xr ntpd 1ntpdmdoc 2686and the major system events. --- 7 unchanged lines hidden (view full) --- 2694synchronization information. 2695All other events and messages about 2696peers, system events and so on is suppressed. 2697.It Ic logfile Ar logfile 2698This command specifies the location of an alternate log file to 2699be used instead of the default system 2700.Xr syslog 3 2701facility. |
2656This is the same operation as the -l command line option. | 2702This is the same operation as the 2703.Fl l 2704command line option. |
2657.It Ic setvar Ar variable Op Cm default 2658This command adds an additional system variable. 2659These 2660variables can be used to distribute additional information such as 2661the access policy. 2662If the variable of the form 2663.Sm off 2664.Va name = Ar value --- 135 unchanged lines hidden (view full) --- 2800-1 means "do not lock the process into memory". 28010 means "lock whatever memory the process wants into memory". 2802.It Cm stacksize Ar N4kPages 2803Specifies the maximum size of the process stack on systems with the 2804.Fn mlockall 2805function. 2806Defaults to 50 4k pages (200 4k pages in OpenBSD). 2807.It Cm filenum Ar Nfiledescriptors | 2705.It Ic setvar Ar variable Op Cm default 2706This command adds an additional system variable. 2707These 2708variables can be used to distribute additional information such as 2709the access policy. 2710If the variable of the form 2711.Sm off 2712.Va name = Ar value --- 135 unchanged lines hidden (view full) --- 2848-1 means "do not lock the process into memory". 28490 means "lock whatever memory the process wants into memory". 2850.It Cm stacksize Ar N4kPages 2851Specifies the maximum size of the process stack on systems with the 2852.Fn mlockall 2853function. 2854Defaults to 50 4k pages (200 4k pages in OpenBSD). 2855.It Cm filenum Ar Nfiledescriptors |
2808Specifies the maximum number of file descriptors ntpd may have open at once. Defaults to the system default. | 2856Specifies the maximum number of file descriptors ntpd may have open at once. 2857Defaults to the system default. |
2809.El 2810.It Xo Ic trap Ar host_address 2811.Op Cm port Ar port_number 2812.Op Cm interface Ar interface_address 2813.Xc 2814This command configures a trap receiver at the given host 2815address and port number for sending messages with the specified 2816local interface address. --- 90 unchanged lines hidden --- | 2858.El 2859.It Xo Ic trap Ar host_address 2860.Op Cm port Ar port_number 2861.Op Cm interface Ar interface_address 2862.Xc 2863This command configures a trap receiver at the given host 2864address and port number for sending messages with the specified 2865local interface address. --- 90 unchanged lines hidden --- |