Replay progress report

Eric S. Raymond esr at snark.thyrsus.com
Wed Dec 30 18:21:39 UTC 2015


Having gotten past the artificial block created by dolfptoa()/atolfp()
not round-tripping (grrr...) I now have teplay mode properly
interpreting captured packets.

This is my current replay est load:

NTP replay version 1
startup -g -q
random init_peer 1658608572
systime measure_tick_fuzz 1451424973.529194328
systime init_proto 1451424973.529227712
startconfig
# /etc/ntp.conf, configuration for ntpd; see ntp.conf(5) for help

driftfile /var/lib/ntp/ntp.drift


# Enable this if you want statistics to be logged.
#statsdir /var/log/ntpstats/

statistics loopstats peerstats clockstats
filegen loopstats file loopstats type day enable
filegen peerstats file peerstats type day enable
filegen clockstats file clockstats type day enable

# Specify one or more NTP servers.

# Use servers from the NTP Pool Project. Approved by Ubuntu Technical Board
# on 2011-02-08 (LP: #104525). See http://www.pool.ntp.org/join.html for
# more information.
server 0.ubuntu.pool.ntp.org
server 1.ubuntu.pool.ntp.org
server 2.ubuntu.pool.ntp.org
server 3.ubuntu.pool.ntp.org

# Use Ubuntu's ntp server as a fallback.
server ntp.ubuntu.com

# Access control configuration; see /usr/share/doc/ntp-doc/html/accopt.html for
# details.  The web page <http://support.ntp.org/bin/view/Support/AccessRestrictions>
# might also be helpful.
#
# Note that "restrict" applies to both servers and clients, so a configuration
# that might be intended to block requests from certain clients could also end
# up blocking replies from your own upstream servers.

# By default, exchange time with everybody, but don't allow configuration.
restrict -4 default kod notrap nomodify nopeer noquery
restrict -6 default kod notrap nomodify nopeer noquery

# Local users may interrogate the ntp server more closely.
restrict 127.0.0.1
restrict ::1

# Clients from this (example!) subnet have unlimited access, but only if
# cryptographically authenticated.
#restrict 192.168.123.0 mask 255.255.255.0 notrust


# If you want to provide time to your local subnet, change the next line.
# (Again, the address is an example only.)
#broadcast 192.168.123.255

# If you want to listen to time broadcasts on your local subnet, de-comment the
# next lines.  Please do this only if you trust everybody on the network!
#disable auth
#broadcastclient
endconfig
drift-read -7.301
sendpkt peer_xmit 38.111.6.68 227:0:6:-20:0:0:1414090313:0:0:0:4e7b2dda054ed188 nomac
sendpkt peer_xmit 2604:a880:800:10::bc:c006 227:0:6:-20:0:0:1414090313:0:0:0:4e7b2dda5226d688 nomac
sendpkt peer_xmit 96.126.105.86 227:0:6:-20:0:0:1414090313:0:0:0:4e7b2dda6a02d988 nomac
receive 1 da2d7b4e8b9c4d19 96.126.105.86 36:2:6:-22:3926065152:1963458560:3876320900:c7762ddadf7a024f:4e7b2dda6a02d988:4e7b2dda4520a08b:4e7b2dda48d3a38b nomac
adjtime 0 5483 4 9
finish 0

Currently replay gets into receive() of the packet on the last line and
then croaks because there's no peer structure corresponding to the
source address 96.126.105.86.

So, my next challenge is to set up the peer structure list properly in
replay mode.
-- 
		<a href="http://www.catb.org/~esr/">Eric S. Raymond</a>

All governments are more or less combinations against the
people. . .and as rulers have no more virtue than the ruled. . .
the power of government can only be kept within its constituted
bounds by the display of a power equal to itself, the collected
sentiment of the people.
	-- Benjamin Franklin Bache, in a Phildelphia Aurora editorial 1794


More information about the devel mailing list