Buggy WNRO fixup
Udo van den Heuvel
udovdh at xs4all.nl
Sat Feb 12 11:22:03 UTC 2022
On 12-02-2022 08:37, Hal Murray wrote:
>
> Please try git head. I fixed my test case.
Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: ntpd ntpsec-1.2.1: Starting
Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: Command line: /usr/sbin/ntpd
-u ntp:ntp -x -N -p /var/run/ntpd.pid
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: precision = 0.908 usec (-20)
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: successfully locked into RAM
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: readconfig: parsing file:
/etc/ntp.conf
Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: reading
/etc/ntp/keys
Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: added 0 keys
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: 'monitor' cannot be
disabled while 'limited' is enabled
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: Using SO_TIMESTAMPNS(ns)
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 0
v6wildcard [::]:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 1
v4wildcard 0.0.0.0:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 2 lo
127.0.0.1:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 3 eth0
192.168.10.70:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 4 lo [::1]:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listening on routing socket on
fd #21 for interface updates
Feb 12 12:17:10 plnksrf ntpd[148642]: SYNC: Found 15 servers, suggest
minsane at least 3
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: MRU 10922 entries, 13 hash
bits, 65536 bytes
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: OpenSSL 1.1.1l FIPS 24 Aug
2021, 101010cf
Feb 12 12:17:10 plnksrf ntpd[148642]: NTSc: Using system default root
certificates.
Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]:
INIT: ntpd ntpsec-1.2.1: Starting
Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]:
INIT: Command line: /usr/sbin/ntpd -u ntp:ntp -x -N -p /var/run/ntpd.pid
Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: DNS lookup of
time.cloudflare.com:1234 took 0.023 sec
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: connecting to
time.cloudflare.com:1234 => 162.159.200.123:1234
Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using TLSv1.3,
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate subject name:
/C=US/ST=California/L=San Francisco/O=Cloudflare,
Inc./CN=time.cloudflare.com
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate issuer name:
/C=US/O=DigiCert Inc/CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: read 750 bytes
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using port 123
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Got 7 cookies, length 100,
aead=15.
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: NTS-KE req to
time.cloudflare.com:1234 took 0.140 sec, OK
Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: DNS lookup of
ntpmon.dcs1.biz took 0.084 sec
Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: connecting to
ntpmon.dcs1.biz:4460 => 203.123.48.219:4460
Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connect_TCP_socket: connect
failed: Connection refused
Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: DNS lookup of pi4.rellim.com
took 0.241 sec
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connecting to
pi4.rellim.com:4460 => 204.17.205.24:4460
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Using TLSv1.3,
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate subject name:
/CN=pi4.rellim.com
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate issuer name:
/C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104,
aead=15.
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: NTS-KE req to pi4.rellim.com
took 1.107 sec, OK
Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: DNS lookup of
ntp2.glypnod.com took 0.153 sec
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: connecting to
ntp2.glypnod.com:4460 => 178.62.68.79:4460
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: Using TLSv1.3,
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate subject name:
/CN=ntp2.glypnod.com
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate issuer name:
/C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104,
aead=15.
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: NTS-KE req to
ntp2.glypnod.com took 0.273 sec, OK
Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
1024 weeks, WNRO
Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by
0 weeks, WNRO
(cut)
The GPS really lost the date:
$GPRMC,111848,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*79
$GPGGA,111848,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*61
$GPRMC,111849,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*78
$GPGGA,111849,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*60
$GPRMC,111850,A,5150.2209,N,00457.3691,E,000.0,346.3,290602,000.6,E*72
Udo
More information about the devel
mailing list