The t column is a "u" for user/client. (Looks like "l" for refclocks. It
used to be interesting for broadcast and such, but I think you can figure that
out from the remote address.)
We can put 0-8 in that slot to indicate that we are talking to that server
with NTS and show the number of co
> Excellent. What's the bext thing you need from me?
Testing. Get it up and running in your local environment. If you have a real
certificate and are willing to support some testing traffic, tell me/us the
host name and/or send us the root certificate.
If you want to write code, we need to s
Hal Murray via devel :
>
> The server side needs a cookie and private key.
>
> The K and I used to encrypt cookies is a hack constant so old cookies work
> over server reboots.
>
> The client side defaults to using the system root certificates. You can
> provide your own.
>
> With the NTS fl
The server side needs a cookie and private key.
The K and I used to encrypt cookies is a hack constant so old cookies work
over server reboots.
The client side defaults to using the system root certificates. You can
provide your own.
With the NTS flag, the client side tries NTS-KE, and drop
Found it. I was storing a cookie into slot 8 of an 8 element array.
Cleanup time.
--
These are my opinions. I hate spam.
___
devel mailing list
devel@ntpsec.org
http://lists.ntpsec.org/mailman/listinfo/devel
Hal Murray via devel :
> Here is the main thread:
> (gdb) thread 1
> [Switching to thread 1 (Thread 0x7784f740 (LWP 24041))]
> #0 0x77a41ef7 in __nptl_setxid () from /lib64/libpthread.so.0
> (gdb) bt
> #0 0x77a41ef7 in __nptl_setxid () from /lib64/libpthread.so.0
> #1 0x7
Hal, I'm thinking next I'll add a section to the Hacking Guide on how
to add new Mode 6 variables. It will be easier now.
Then you can decide whether it will be faster to do them yourself or
hand off a spec to me. I'm happy to oblige if you choose the latter.
--
http://www.catb.or
I'm getting close. I'm debugging by printf. I think I just processed the
first NTS round trip. Then I get this:
19 Feb 17:58:54 ntpd[23678]: DNS: dns_take_status: rp11.example.com=>good, 0
ECR: 10, 32, 180
ECR: 13, 144, 144
ECRa: 108, 16
ECRb: 1, 108
ECR: 11, 104, 104
ECRx: 1, 8
Segmentation
James Browning via devel :
> I have a branch 'control-denum' which takes a significantly wrong
> approach and replaces many of the #define directives and replaces
> them with a trio of enums. completely untested of course. IMO a
> slightly less wrong solution might be to extend the table to have
>
On 2/19/19, Eric S. Raymond via devel wrote:
> Hal Murray :
>> The thing that gripes me about ntp_control is that for each of the tables
>>
>> mentioned above, there are actually 3 parallel tables and they are a long
>> way
>> apart so a pain to update. Maybe if we just interlaces the #defines wi
Hal Murray :
> The thing that gripes me about ntp_control is that for each of the tables
> mentioned above, there are actually 3 parallel tables and they are a long way
> apart so a pain to update. Maybe if we just interlaces the #defines with the
> text lookup tables it would be less painful t
e...@thyrsus.com said:
> What I will do, unless you tell me there's something really important about
> those three wired-in order tables in ntp_control.c, is move them to ntpq.
I think the 3 tables are in 3 different spaces. There is the main table of
global variables. There is the one for th
Hal Murray :
> > I'll study authinfo and get back to you, probably tomorrow.
>
> authinfo is a bad example. ntpq has its own copy of that list.
ntpq has its own copy of the lists for almost *all* the standard ntpq displays.
There are only three exceptions; those lists are in ntp_control.c
> I t
Hal, I've so far created three: ntskeyfetches, ntsvalidations,
ntsdecorations. They're listed by a new "ntsinfo" command in ntpq.
You should see ntskeyfetches move when a request for NTS keys has gone
through. The other two are bumped in presently-unused stubs.
I'll try to make analogs of the o
14 matches
Mail list logo