On Sun, Aug 25, 2019 at 4:46 AM Hal Murray via devel <devel@ntpsec.org>
wrote:

> The 3rd case is when it gets back something other than "ntske/1".
> I haven't found a test case for that one yet.  If anybody still has a
> system
> still running our old/buggy code, please let me know the IP Address.
>

Hal, 203.123.48.1 has been downgraded to NTPsec_1_1_6-3-g8e3daaf0b

commit 8e3daaf0b19a2c223553f8c46c27287147d983fa (HEAD)
Author: Hal Murray <hmur...@megapathdsl.net>
Date:   Sat Jul 13 16:37:06 2019 -0700

    Make auth column from ntpq assoc work for NTS.

root@robustb:~/ntpsec# ntpq -p
     remote           refid      st t when poll reach   delay   offset
jitter
===============================================================================
*ntpmon.dcs1.biz .PPS.            1 u   23   64   17   0.2583 -153.685
118.5922
+netmon2.dcs1.bi 210.23.25.77     2 u   19   64   17   0.3604 -157.341
121.3906
+ntp1.glypnod.co 204.123.2.72     2 8   21   64   17 167.7686 -154.635
118.3224
+ntp2.glypnod.co 139.143.5.30     3 8   17   64   17 186.6249 -157.633
121.6622
root@robustb:~/ntpsec# ntpq -c nts
NTS client sends:            18
NTS client recvs good:       18
NTS client recvs w error:    0
NTS server recvs good:       0
NTS server recvs w error:    0
NTS server sends:            0
NTS make cookies:            0
NTS decode cookies:          0
NTS decode cookies old:      0
NTS decode cookies too old:  0
NTS decode cookies error:    0
NTS KE probes good:          2
NTS KE probes_bad:           0
NTS KE serves good:          0
NTS KE serves_bad:           0

I will keep this running while you test.
_______________________________________________
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel

Reply via email to