While debugging some NTP weirdness, I noticed an outlier amongst the
constraints (all except one had an offset less than 1s, the one
outlier was over 7 hours off).  Unfortunately, I couldn't tell which
constraint had the outlier, because the IP's rDNS didn't correspond
to one of the constraints (it was cloudfront's), and none of the
constraints resolve to the IP address logged.

Therefore, I suggest the following patch which logs the name of the
constraint together with its IP address:

Index: constraint.c
===================================================================
RCS file: /cvs/src/usr.sbin/ntpd/constraint.c,v
retrieving revision 1.54
diff -u -p -r1.54 constraint.c
--- constraint.c        27 Nov 2022 13:19:00 -0000      1.54
+++ constraint.c        20 Apr 2023 09:03:00 -0000
@@ -679,8 +679,9 @@ constraint_msg_result(u_int32_t id, u_in
        offset = gettime_from_timeval(&tv[0]) -
            gettime_from_timeval(&tv[1]);
 
-       log_info("constraint reply from %s: offset %f",
+       log_info("constraint reply from %s (%s): offset %f",
            log_sockaddr((struct sockaddr *)&cstr->addr->ss),
+           cstr->addr_head.name,
            offset);
 
        cstr->state = STATE_REPLY_RECEIVED;

Cheers,

Paul

-- 
>++++++++[<++++++++++>-]<+++++++.>+++[<------>-]<.>+++[<+
+++++++++++>-]<.>++[<------------>-]<+.--------------.[-]
                 http://www.weirdnet.nl/                 

Reply via email to