An ntpmon proof-of-concept exists

Eric S. Raymond esr at thyrsus.com
Sat Nov 26 04:33:27 UTC 2016


Hal Murray <hmurray at megapathdsl.net>:
> 
> > The other problem is a bit more serious.  I can't seem to get my ntpd to
> > report mrulist entries.  This hampers testing of ntpmon; the lower window is
> > supposed to be an mrulist display.  Right now I can only demonstrate the
> > upper half, the automatically-refreshing peers display. 
> 
> It will probably be simple after we find it.
> 
> Send me a copy of your ntp.conf

# /etc/ntp.conf, configuration for ntpd; see ntp.conf(5) for help

driftfile /var/lib/ntp/ntp.drift


# Enable this if you want statistics to be logged.
statsdir /var/log/ntpstats/

statistics loopstats peerstats clockstats rawstats
filegen loopstats file loopstats type day enable
filegen peerstats file peerstats type day enable
filegen clockstats file clockstats type day enable

#refclock shm unit 0 flag4 1 refid GPS
#refclock shm unit 1 prefer flag4 1 refid PPS
#refclock nmea baud 9600 path /dev/ttyUSB0

# Specify one or more NTP servers.

#server [2001:470:e815::8] maxpoll 5 # spidey.rellim.com

# Use servers from the NTP Pool Project. Approved by Ubuntu Technical Board
# on 2011-02-08 (LP: #104525). See http://www.pool.ntp.org/join.html for
# more information.
#server 0.ubuntu.pool.ntp.org
#server 1.ubuntu.pool.ntp.org
#server 2.ubuntu.pool.ntp.org
#server 3.ubuntu.pool.ntp.org

pool us.pool.ntp.org

# Use Ubuntu's ntp server as a fallback.
#server ntp.ubuntu.com

# Access control configuration; see /usr/share/doc/ntp-doc/html/accopt.html for
# details.  The web page <http://support.ntp.org/bin/view/Support/AccessRestrictions>
# might also be helpful.
#
# Note that "restrict" applies to both servers and clients, so a configuration
# that might be intended to block requests from certain clients could also end
# up blocking replies from your own upstream servers.

# By default, exchange time with everybody, but don't allow configuration.
restrict -4 default notrap nomodify nopeer noquery
restrict -6 default notrap nomodify nopeer noquery

# Local users may interrogate the ntp server more closely.
restrict 127.0.0.1
restrict ::1

# Clients from this (example!) subnet have unlimited access, but only if
# cryptographically authenticated.
#restrict 192.168.123.0 mask 255.255.255.0 notrust


# If you want to provide time to your local subnet, change the next line.
# (Again, the address is an example only.)
#broadcast 192.168.123.255

# If you want to listen to time broadcasts on your local subnet, de-comment the
# next lines.  Please do this only if you trust everybody on the network!
#disable auth
#broadcastclient

keys /usr/local/etc/ntp.keys
trustedkey 10
controlkey 10


> What do you have on your waf configure line?

./waf configure --enable-crypto --refclock=all --enable-doc
-- 
		<a href="http://www.catb.org/~esr/">Eric S. Raymond</a>


More information about the devel mailing list