On Sun, Aug 25, 2019 at 4:46 AM Hal Murray via devel <devel@ntpsec.org> wrote:
> The 3rd case is when it gets back something other than "ntske/1". > I haven't found a test case for that one yet. If anybody still has a > system > still running our old/buggy code, please let me know the IP Address. > Hal, 203.123.48.1 has been downgraded to NTPsec_1_1_6-3-g8e3daaf0b commit 8e3daaf0b19a2c223553f8c46c27287147d983fa (HEAD) Author: Hal Murray <hmur...@megapathdsl.net> Date: Sat Jul 13 16:37:06 2019 -0700 Make auth column from ntpq assoc work for NTS. root@robustb:~/ntpsec# ntpq -p remote refid st t when poll reach delay offset jitter =============================================================================== *ntpmon.dcs1.biz .PPS. 1 u 23 64 17 0.2583 -153.685 118.5922 +netmon2.dcs1.bi 210.23.25.77 2 u 19 64 17 0.3604 -157.341 121.3906 +ntp1.glypnod.co 204.123.2.72 2 8 21 64 17 167.7686 -154.635 118.3224 +ntp2.glypnod.co 139.143.5.30 3 8 17 64 17 186.6249 -157.633 121.6622 root@robustb:~/ntpsec# ntpq -c nts NTS client sends: 18 NTS client recvs good: 18 NTS client recvs w error: 0 NTS server recvs good: 0 NTS server recvs w error: 0 NTS server sends: 0 NTS make cookies: 0 NTS decode cookies: 0 NTS decode cookies old: 0 NTS decode cookies too old: 0 NTS decode cookies error: 0 NTS KE probes good: 2 NTS KE probes_bad: 0 NTS KE serves good: 0 NTS KE serves_bad: 0 I will keep this running while you test.
_______________________________________________ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel