ntpdc.8 revision 290001
1.Dd October 21 2015
2.Dt NTPDC 8 User Commands
3.Os
4.\"  EDIT THIS FILE WITH CAUTION  (ntpdc-opts.mdoc)
5.\"
6.\" $FreeBSD: releng/9.3/usr.sbin/ntp/doc/ntpdc.8 290001 2015-10-26 11:42:25Z glebius $
7.\"
8.\"  It has been AutoGen-ed  October 21, 2015 at 12:38:57 PM by AutoGen 5.18.5
9.\"  From the definitions    ntpdc-opts.def
10.\"  and the template file   agmdoc-cmd.tpl
11.Sh NAME
12.Nm ntpdc
13.Nd vendor-specific NTPD control program
14.Sh SYNOPSIS
15.Nm
16.\" Mixture of short (flag) options and long options
17.Op Fl flags
18.Op Fl flag Op Ar value
19.Op Fl \-option\-name Ns Oo Oo Ns "=| " Oc Ns Ar value Oc
20[ host ...]
21.Pp
22.Sh DESCRIPTION
23.Nm
24is deprecated.
25Please use
26.Xr ntpq 8 instead \- it can do everything
27.Nm
28used to do, and it does so using a much more sane interface.
29.Pp
30.Nm
31is a utility program used to query
32.Xr ntpd 8
33about its
34current state and to request changes in that state.
35It uses NTP mode 7 control message formats described in the source code.
36The program may
37be run either in interactive mode or controlled using command line
38arguments.
39Extensive state and statistics information is available
40through the
41.Nm
42interface.
43In addition, nearly all the
44configuration options which can be specified at startup using
45ntpd's configuration file may also be specified at run time using
46.Nm .
47.Sh "OPTIONS"
48.Bl -tag
49.It  Fl 4 , Fl \-ipv4 
50Force IPv4 DNS name resolution.
51This option must not appear in combination with any of the following options:
52ipv6.
53.sp
54Force DNS resolution of following host names on the command line
55to the IPv4 namespace.
56.It  Fl 6 , Fl \-ipv6 
57Force IPv6 DNS name resolution.
58This option must not appear in combination with any of the following options:
59ipv4.
60.sp
61Force DNS resolution of following host names on the command line
62to the IPv6 namespace.
63.It  Fl c Ar cmd , Fl \-command Ns = Ns Ar cmd 
64run a command and exit.
65This option may appear an unlimited number of times.
66.sp
67The following argument is interpreted as an interactive format command
68and is added to the list of commands to be executed on the specified
69host(s).
70.It  Fl d , Fl \-debug\-level 
71Increase debug verbosity level.
72This option may appear an unlimited number of times.
73.sp
74.It  Fl D Ar number , Fl \-set\-debug\-level Ns = Ns Ar number 
75Set the debug verbosity level.
76This option may appear an unlimited number of times.
77This option takes an integer number as its argument.
78.sp
79.It  Fl i , Fl \-interactive 
80Force ntpq to operate in interactive mode.
81This option must not appear in combination with any of the following options:
82command, listpeers, peers, showpeers.
83.sp
84Force ntpq to operate in interactive mode.  Prompts will be written
85to the standard output and commands read from the standard input.
86.It  Fl l , Fl \-listpeers 
87Print a list of the peers.
88This option must not appear in combination with any of the following options:
89command.
90.sp
91Print a list of the peers known to the server as well as a summary of
92their state. This is equivalent to the 'listpeers' interactive command.
93.It  Fl n , Fl \-numeric 
94numeric host addresses.
95.sp
96Output all host addresses in dotted\-quad numeric format rather than
97converting to the canonical host names. 
98.It  Fl p , Fl \-peers 
99Print a list of the peers.
100This option must not appear in combination with any of the following options:
101command.
102.sp
103Print a list of the peers known to the server as well as a summary
104of their state. This is equivalent to the 'peers' interactive command.
105.It  Fl s , Fl \-showpeers 
106Show a list of the peers.
107This option must not appear in combination with any of the following options:
108command.
109.sp
110Print a list of the peers known to the server as well as a summary
111of their state. This is equivalent to the 'dmpeers' interactive command.
112.It Fl \&? , Fl \-help
113Display usage information and exit.
114.It Fl \&! , Fl \-more\-help
115Pass the extended usage information through a pager.
116.It Fl > Oo Ar cfgfile Oc , Fl \-save\-opts Oo Ns = Ns Ar cfgfile Oc
117Save the option state to \fIcfgfile\fP.  The default is the \fIlast\fP
118configuration file listed in the \fBOPTION PRESETS\fP section, below.
119The command will exit after updating the config file.
120.It Fl < Ar cfgfile , Fl \-load\-opts Ns = Ns Ar cfgfile , Fl \-no\-load\-opts
121Load options from \fIcfgfile\fP.
122The \fIno\-load\-opts\fP form will disable the loading
123of earlier config/rc/ini files.  \fI\-\-no\-load\-opts\fP is handled early,
124out of order.
125.It Fl \-version Op Brq Ar v|c|n
126Output version of program and exit.  The default mode is `v', a simple
127version.  The `c' mode will print copyright information and `n' will
128print the full copyright notice.
129.El
130.Sh "OPTION PRESETS"
131Any option that is not marked as \fInot presettable\fP may be preset
132by loading values from configuration ("RC" or ".INI") file(s) and values from
133environment variables named:
134.nf
135  \fBNTPDC_<option\-name>\fP or \fBNTPDC\fP
136.fi
137.ad
138The environmental presets take precedence (are processed later than)
139the configuration files.
140The \fIhomerc\fP files are "\fI$HOME\fP", and "\fI.\fP".
141If any of these are directories, then the file \fI.ntprc\fP
142is searched for within those directories.
143.Sh USAGE
144If one or more request options are included on the command line
145when
146.Nm
147is executed, each of the requests will be sent
148to the NTP servers running on each of the hosts given as command
149line arguments, or on localhost by default.
150If no request options
151are given,
152.Nm
153will attempt to read commands from the
154standard input and execute these on the NTP server running on the
155first host given on the command line, again defaulting to localhost
156when no other host is specified.
157The
158.Nm
159utility will prompt for
160commands if the standard input is a terminal device.
161.Pp
162The
163.Nm
164utility uses NTP mode 7 packets to communicate with the
165NTP server, and hence can be used to query any compatible server on
166the network which permits it.
167Note that since NTP is a UDP protocol
168this communication will be somewhat unreliable, especially over
169large distances in terms of network topology.
170The
171.Nm
172utility makes
173no attempt to retransmit requests, and will time requests out if
174the remote host is not heard from within a suitable timeout
175time.
176.Pp
177The operation of
178.Nm
179are specific to the particular
180implementation of the
181.Xr ntpd 8
182daemon and can be expected to
183work only with this and maybe some previous versions of the daemon.
184Requests from a remote
185.Nm
186utility which affect the
187state of the local server must be authenticated, which requires
188both the remote program and local server share a common key and key
189identifier.
190.Pp
191Note that in contexts where a host name is expected, a
192.Fl 4
193qualifier preceding the host name forces DNS resolution to the IPv4 namespace,
194while a
195.Fl 6
196qualifier forces DNS resolution to the IPv6 namespace.
197Specifying a command line option other than
198.Fl i
199or
200.Fl n
201will cause the specified query (queries) to be sent to
202the indicated host(s) immediately.
203Otherwise,
204.Nm
205will
206attempt to read interactive format commands from the standard
207input.
208.Ss "Interactive Commands"
209Interactive format commands consist of a keyword followed by zero
210to four arguments.
211Only enough characters of the full keyword to
212uniquely identify the command need be typed.
213The output of a
214command is normally sent to the standard output, but optionally the
215output of individual commands may be sent to a file by appending a
216.Ql \&> ,
217followed by a file name, to the command line.
218.Pp
219A number of interactive format commands are executed entirely
220within the
221.Nm
222utility itself and do not result in NTP
223mode 7 requests being sent to a server.
224These are described
225following.
226.Bl -tag -width indent
227.It Ic \&? Ar command_keyword
228.It Ic help Ar command_keyword
229A
230.Sq Ic \&?
231will print a list of all the command
232keywords known to this incarnation of
233.Nm .
234A
235.Sq Ic \&?
236followed by a command keyword will print function and usage
237information about the command.
238This command is probably a better
239source of information about
240.Xr ntpq 8
241than this manual
242page.
243.It Ic delay Ar milliseconds
244Specify a time interval to be added to timestamps included in
245requests which require authentication.
246This is used to enable
247(unreliable) server reconfiguration over long delay network paths
248or between machines whose clocks are unsynchronized.
249Actually the
250server does not now require timestamps in authenticated requests,
251so this command may be obsolete.
252.It Ic host Ar hostname
253Set the host to which future queries will be sent.
254Hostname may
255be either a host name or a numeric address.
256.It Ic hostnames Op Cm yes | Cm no
257If
258.Cm yes
259is specified, host names are printed in
260information displays.
261If
262.Cm no
263is specified, numeric
264addresses are printed instead.
265The default is
266.Cm yes ,
267unless
268modified using the command line
269.Fl n
270switch.
271.It Ic keyid Ar keyid
272This command allows the specification of a key number to be
273used to authenticate configuration requests.
274This must correspond
275to a key number the server has been configured to use for this
276purpose.
277.It Ic quit
278Exit
279.Nm .
280.It Ic passwd
281This command prompts you to type in a password (which will not
282be echoed) which will be used to authenticate configuration
283requests.
284The password must correspond to the key configured for
285use by the NTP server for this purpose if such requests are to be
286successful.
287.It Ic timeout Ar milliseconds
288Specify a timeout period for responses to server queries.
289The
290default is about 8000 milliseconds.
291Note that since
292.Nm
293retries each query once after a timeout, the total waiting time for
294a timeout will be twice the timeout value set.
295.El
296.Ss "Control Message Commands"
297Query commands result in NTP mode 7 packets containing requests for
298information being sent to the server.
299These are read\-only commands
300in that they make no modification of the server configuration
301state.
302.Bl -tag -width indent
303.It Ic listpeers
304Obtains and prints a brief list of the peers for which the
305server is maintaining state.
306These should include all configured
307peer associations as well as those peers whose stratum is such that
308they are considered by the server to be possible future
309synchronization candidates.
310.It Ic peers
311Obtains a list of peers for which the server is maintaining
312state, along with a summary of that state.
313Summary information
314includes the address of the remote peer, the local interface
315address (0.0.0.0 if a local address has yet to be determined), the
316stratum of the remote peer (a stratum of 16 indicates the remote
317peer is unsynchronized), the polling interval, in seconds, the
318reachability register, in octal, and the current estimated delay,
319offset and dispersion of the peer, all in seconds.
320.Pp
321The character in the left margin indicates the mode this peer
322entry is operating in.
323A
324.Ql \&+
325denotes symmetric active, a
326.Ql \&\-
327indicates symmetric passive, a
328.Ql \&=
329means the
330remote server is being polled in client mode, a
331.Ql \&^
332indicates that the server is broadcasting to this address, a
333.Ql \&~
334denotes that the remote peer is sending broadcasts and a
335.Ql \&~
336denotes that the remote peer is sending broadcasts and a
337.Ql \&*
338marks the peer the server is currently synchronizing
339to.
340.Pp
341The contents of the host field may be one of four forms.
342It may
343be a host name, an IP address, a reference clock implementation
344name with its parameter or
345.Fn REFCLK "implementation_number" "parameter" .
346On
347.Ic hostnames
348.Cm no
349only IP\-addresses
350will be displayed.
351.It Ic dmpeers
352A slightly different peer summary list.
353Identical to the output
354of the
355.Ic peers
356command, except for the character in the
357leftmost column.
358Characters only appear beside peers which were
359included in the final stage of the clock selection algorithm.
360A
361.Ql \&.
362indicates that this peer was cast off in the falseticker
363detection, while a
364.Ql \&+
365indicates that the peer made it
366through.
367A
368.Ql \&*
369denotes the peer the server is currently
370synchronizing with.
371.It Ic showpeer Ar peer_address Oo Ar ... Oc
372Shows a detailed display of the current peer variables for one
373or more peers.
374Most of these values are described in the NTP
375Version 2 specification.
376.It Ic pstats Ar peer_address Oo Ar ... Oc
377Show per\-peer statistic counters associated with the specified
378peer(s).
379.It Ic clockstat Ar clock_peer_address Oo Ar ... Oc
380Obtain and print information concerning a peer clock.
381The
382values obtained provide information on the setting of fudge factors
383and other clock performance information.
384.It Ic kerninfo
385Obtain and print kernel phase\-lock loop operating parameters.
386This information is available only if the kernel has been specially
387modified for a precision timekeeping function.
388.It Ic loopinfo Op Cm oneline | Cm multiline
389Print the values of selected loop filter variables.
390The loop
391filter is the part of NTP which deals with adjusting the local
392system clock.
393The
394.Sq offset
395is the last offset given to the
396loop filter by the packet processing code.
397The
398.Sq frequency
399is the frequency error of the local clock in parts\-per\-million
400(ppm).
401The
402.Sq time_const
403controls the stiffness of the
404phase\-lock loop and thus the speed at which it can adapt to
405oscillator drift.
406The
407.Sq watchdog timer
408value is the number
409of seconds which have elapsed since the last sample offset was
410given to the loop filter.
411The
412.Cm oneline
413and
414.Cm multiline
415options specify the format in which this
416information is to be printed, with
417.Cm multiline
418as the
419default.
420.It Ic sysinfo
421Print a variety of system state variables, i.e., state related
422to the local server.
423All except the last four lines are described
424in the NTP Version 3 specification, RFC\-1305.
425.Pp
426The
427.Sq system flags
428show various system flags, some of
429which can be set and cleared by the
430.Ic enable
431and
432.Ic disable
433configuration commands, respectively.
434These are
435the
436.Cm auth ,
437.Cm bclient ,
438.Cm monitor ,
439.Cm pll ,
440.Cm pps
441and
442.Cm stats
443flags.
444See the
445.Xr ntpd 8
446documentation for the meaning of these flags.
447There
448are two additional flags which are read only, the
449.Cm kernel_pll
450and
451.Cm kernel_pps .
452These flags indicate
453the synchronization status when the precision time kernel
454modifications are in use.
455The
456.Sq kernel_pll
457indicates that
458the local clock is being disciplined by the kernel, while the
459.Sq kernel_pps
460indicates the kernel discipline is provided by the PPS
461signal.
462.Pp
463The
464.Sq stability
465is the residual frequency error remaining
466after the system frequency correction is applied and is intended for
467maintenance and debugging.
468In most architectures, this value will
469initially decrease from as high as 500 ppm to a nominal value in
470the range .01 to 0.1 ppm.
471If it remains high for some time after
472starting the daemon, something may be wrong with the local clock,
473or the value of the kernel variable
474.Va kern.clockrate.tick
475may be
476incorrect.
477.Pp
478The
479.Sq broadcastdelay
480shows the default broadcast delay,
481as set by the
482.Ic broadcastdelay
483configuration command.
484.Pp
485The
486.Sq authdelay
487shows the default authentication delay,
488as set by the
489.Ic authdelay
490configuration command.
491.It Ic sysstats
492Print statistics counters maintained in the protocol
493module.
494.It Ic memstats
495Print statistics counters related to memory allocation
496code.
497.It Ic iostats
498Print statistics counters maintained in the input\-output
499module.
500.It Ic timerstats
501Print statistics counters maintained in the timer/event queue
502support code.
503.It Ic reslist
504Obtain and print the server's restriction list.
505This list is
506(usually) printed in sorted order and may help to understand how
507the restrictions are applied.
508.It Ic monlist Op Ar version
509Obtain and print traffic counts collected and maintained by the
510monitor facility.
511The version number should not normally need to be
512specified.
513.It Ic clkbug Ar clock_peer_address Oo Ar ... Oc
514Obtain debugging information for a reference clock driver.
515This
516information is provided only by some clock drivers and is mostly
517undecodable without a copy of the driver source in hand.
518.El
519.Ss "Runtime Configuration Requests"
520All requests which cause state changes in the server are
521authenticated by the server using a configured NTP key (the
522facility can also be disabled by the server by not configuring a
523key).
524The key number and the corresponding key must also be made
525known to
526.Nm .
527This can be done using the
528.Ic keyid
529and
530.Ic passwd
531commands, the latter of which will prompt at the terminal for a
532password to use as the encryption key.
533You will also be prompted
534automatically for both the key number and password the first time a
535command which would result in an authenticated request to the
536server is given.
537Authentication not only provides verification that
538the requester has permission to make such changes, but also gives
539an extra degree of protection again transmission errors.
540.Pp
541Authenticated requests always include a timestamp in the packet
542data, which is included in the computation of the authentication
543code.
544This timestamp is compared by the server to its receive time
545stamp.
546If they differ by more than a small amount the request is
547rejected.
548This is done for two reasons.
549First, it makes simple
550replay attacks on the server, by someone who might be able to
551overhear traffic on your LAN, much more difficult.
552Second, it makes
553it more difficult to request configuration changes to your server
554from topologically remote hosts.
555While the reconfiguration facility
556will work well with a server on the local host, and may work
557adequately between time\-synchronized hosts on the same LAN, it will
558work very poorly for more distant hosts.
559As such, if reasonable
560passwords are chosen, care is taken in the distribution and
561protection of keys and appropriate source address restrictions are
562applied, the run time reconfiguration facility should provide an
563adequate level of security.
564.Pp
565The following commands all make authenticated requests.
566.Bl -tag -width indent
567.It Xo Ic addpeer Ar peer_address
568.Op Ar keyid
569.Op Ar version
570.Op Cm prefer
571.Xc
572Add a configured peer association at the given address and
573operating in symmetric active mode.
574Note that an existing
575association with the same peer may be deleted when this command is
576executed, or may simply be converted to conform to the new
577configuration, as appropriate.
578If the optional
579.Ar keyid
580is a
581nonzero integer, all outgoing packets to the remote server will
582have an authentication field attached encrypted with this key.
583If
584the value is 0 (or not given) no authentication will be done.
585The
586.Ar version
587can be 1, 2 or 3 and defaults to 3.
588The
589.Cm prefer
590keyword indicates a preferred peer (and thus will
591be used primarily for clock synchronisation if possible).
592The
593preferred peer also determines the validity of the PPS signal \- if
594the preferred peer is suitable for synchronisation so is the PPS
595signal.
596.It Xo Ic addserver Ar peer_address
597.Op Ar keyid
598.Op Ar version
599.Op Cm prefer
600.Xc
601Identical to the addpeer command, except that the operating
602mode is client.
603.It Xo Ic broadcast Ar peer_address
604.Op Ar keyid
605.Op Ar version
606.Op Cm prefer
607.Xc
608Identical to the addpeer command, except that the operating
609mode is broadcast.
610In this case a valid key identifier and key are
611required.
612The
613.Ar peer_address
614parameter can be the broadcast
615address of the local network or a multicast group address assigned
616to NTP.
617If a multicast address, a multicast\-capable kernel is
618required.
619.It Ic unconfig Ar peer_address Oo Ar ... Oc
620This command causes the configured bit to be removed from the
621specified peer(s).
622In many cases this will cause the peer
623association to be deleted.
624When appropriate, however, the
625association may persist in an unconfigured mode if the remote peer
626is willing to continue on in this fashion.
627.It Xo Ic fudge Ar peer_address
628.Op Cm time1
629.Op Cm time2
630.Op Ar stratum
631.Op Ar refid
632.Xc
633This command provides a way to set certain data for a reference
634clock.
635See the source listing for further information.
636.It Xo Ic enable
637.Oo
638.Cm auth | Cm bclient |
639.Cm calibrate | Cm kernel |
640.Cm monitor | Cm ntp |
641.Cm pps | Cm stats
642.Oc
643.Xc
644.It Xo Ic disable
645.Oo
646.Cm auth | Cm bclient |
647.Cm calibrate | Cm kernel |
648.Cm monitor | Cm ntp |
649.Cm pps | Cm stats
650.Oc
651.Xc
652These commands operate in the same way as the
653.Ic enable
654and
655.Ic disable
656configuration file commands of
657.Xr ntpd 8 .
658.Bl -tag -width indent
659.It Cm auth
660Enables the server to synchronize with unconfigured peers only
661if the peer has been correctly authenticated using either public key
662or private key cryptography.
663The default for this flag is enable.
664.It Cm bclient
665Enables the server to listen for a message from a broadcast or
666multicast server, as in the multicastclient command with
667default address.
668The default for this flag is disable.
669.It Cm calibrate
670Enables the calibrate feature for reference clocks.
671The default for this flag is disable.
672.It Cm kernel
673Enables the kernel time discipline, if available.
674The default for this flag is enable if support is available, otherwise disable.
675.It Cm monitor
676Enables the monitoring facility.
677See the documentation here about the
678.Cm monlist
679command or further information.
680The default for this flag is enable.
681.It Cm ntp
682Enables time and frequency discipline.
683In effect, this switch opens and closes the feedback loop,
684which is useful for testing.
685The default for this flag is enable.
686.It Cm pps
687Enables the pulse\-per\-second (PPS) signal when frequency
688and time is disciplined by the precision time kernel modifications.
689See the
690.Qq A Kernel Model for Precision Timekeeping
691(available as part of the HTML documentation
692provided in
693.Pa /usr/share/doc/ntp )
694page for further information.
695The default for this flag is disable.
696.It Cm stats
697Enables the statistics facility.
698See the
699.Sx Monitoring Options
700section of
701.Xr ntp.conf 5
702for further information.
703The default for this flag is disable.
704.El
705.It Xo Ic restrict Ar address Ar mask
706.Ar flag Oo Ar ... Oc
707.Xc
708This command operates in the same way as the
709.Ic restrict
710configuration file commands of
711.Xr ntpd 8 .
712.It Xo Ic unrestrict Ar address Ar mask
713.Ar flag Oo Ar ... Oc
714.Xc
715Unrestrict the matching entry from the restrict list.
716.It Xo Ic delrestrict Ar address Ar mask
717.Op Cm ntpport
718.Xc
719Delete the matching entry from the restrict list.
720.It Ic readkeys
721Causes the current set of authentication keys to be purged and
722a new set to be obtained by rereading the keys file (which must
723have been specified in the
724.Xr ntpd 8
725configuration file).
726This
727allows encryption keys to be changed without restarting the
728server.
729.It Ic trustedkey Ar keyid Oo Ar ... Oc
730.It Ic untrustedkey Ar keyid Oo Ar ... Oc
731These commands operate in the same way as the
732.Ic trustedkey
733and
734.Ic untrustedkey
735configuration file
736commands of
737.Xr ntpd 8 .
738.It Ic authinfo
739Returns information concerning the authentication module,
740including known keys and counts of encryptions and decryptions
741which have been done.
742.It Ic traps
743Display the traps set in the server.
744See the source listing for
745further information.
746.It Xo Ic addtrap Ar address
747.Op Ar port
748.Op Ar interface
749.Xc
750Set a trap for asynchronous messages.
751See the source listing
752for further information.
753.It Xo Ic clrtrap Ar address
754.Op Ar port
755.Op Ar interface
756.Xc
757Clear a trap for asynchronous messages.
758See the source listing
759for further information.
760.It Ic reset
761Clear the statistics counters in various modules of the server.
762See the source listing for further information.
763.El
764.Sh "ENVIRONMENT"
765See \fBOPTION PRESETS\fP for configuration environment variables.
766.Sh "FILES"
767See \fBOPTION PRESETS\fP for configuration files.
768.Sh "EXIT STATUS"
769One of the following exit values will be returned:
770.Bl -tag
771.It 0 " (EXIT_SUCCESS)"
772Successful program execution.
773.It 1 " (EXIT_FAILURE)"
774The operation failed or the command syntax was not valid.
775.It 66 " (EX_NOINPUT)"
776A specified configuration file could not be loaded.
777.It 70 " (EX_SOFTWARE)"
778libopts had an internal operational error.  Please report
779it to autogen\-users@lists.sourceforge.net.  Thank you.
780.El
781.Sh "SEE ALSO"
782.Xr ntp.conf 5 ,
783.Xr ntpd 8
784.Rs
785.%A David L. Mills
786.%T Network Time Protocol (Version 3)
787.%O RFC1305
788.Re
789.Sh AUTHORS
790The formatting directives in this document came from FreeBSD.
791.Sh "COPYRIGHT"
792Copyright (C) 1992\-2015 The University of Delaware and Network Time Foundation all rights reserved.
793This program is released under the terms of the NTP license, <http://ntp.org/license>.
794.Sh BUGS
795The
796.Nm
797utility is a crude hack.
798Much of the information it shows is
799deadly boring and could only be loved by its implementer.
800The
801program was designed so that new (and temporary) features were easy
802to hack in, at great expense to the program's ease of use.
803Despite
804this, the program is occasionally useful.
805.Pp
806Please report bugs to http://bugs.ntp.org .
807.Pp
808Please send bug reports to: http://bugs.ntp.org, bugs@ntp.org
809.Sh "NOTES"
810This manual page was \fIAutoGen\fP\-erated from the \fBntpdc\fP
811option definitions.
812