Buggy WNRO fixup

Udo van den Heuvel udovdh at xs4all.nl
Sat Feb 12 11:22:03 UTC 2022


On 12-02-2022 08:37, Hal Murray wrote:
> 
> Please try git head.  I fixed my test case.

Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: ntpd ntpsec-1.2.1: Starting
Feb 12 12:17:10 plnksrf ntpd[148641]: INIT: Command line: /usr/sbin/ntpd 
-u ntp:ntp -x -N -p /var/run/ntpd.pid
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: precision = 0.908 usec (-20)
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: successfully locked into RAM
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: readconfig: parsing file: 
/etc/ntp.conf
Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: reading 
/etc/ntp/keys
Feb 12 12:17:10 plnksrf ntpd[148642]: AUTH: authreadkeys: added 0 keys
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: restrict nopeer ignored
Feb 12 12:17:10 plnksrf ntpd[148642]: CONFIG: 'monitor' cannot be 
disabled while 'limited' is enabled
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: Using SO_TIMESTAMPNS(ns)
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 0 
v6wildcard [::]:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen and drop on 1 
v4wildcard 0.0.0.0:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 2 lo 
127.0.0.1:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 3 eth0 
192.168.10.70:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listen normally on 4 lo [::1]:123
Feb 12 12:17:10 plnksrf ntpd[148642]: IO: Listening on routing socket on 
fd #21 for interface updates
Feb 12 12:17:10 plnksrf ntpd[148642]: SYNC: Found 15 servers, suggest 
minsane at least 3
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: MRU 10922 entries, 13 hash 
bits, 65536 bytes
Feb 12 12:17:10 plnksrf ntpd[148642]: INIT: OpenSSL 1.1.1l  FIPS 24 Aug 
2021, 101010cf
Feb 12 12:17:10 plnksrf ntpd[148642]: NTSc: Using system default root 
certificates.
Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:10 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]: 
INIT: ntpd ntpsec-1.2.1: Starting
Feb 12 12:17:10 plnksrf ntpd[148641]: 2022-02-12T12:17:10 ntpd[148641]: 
INIT: Command line: /usr/sbin/ntpd -u ntp:ntp -x -N -p /var/run/ntpd.pid
Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:11 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:12 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:13 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:14 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: DNS lookup of 
time.cloudflare.com:1234 took 0.023 sec
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: connecting to 
time.cloudflare.com:1234 => 162.159.200.123:1234
Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, 
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate subject name: 
/C=US/ST=California/L=San Francisco/O=Cloudflare, 
Inc./CN=time.cloudflare.com
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate issuer name: 
/C=US/O=DigiCert Inc/CN=DigiCert TLS Hybrid ECC SHA384 2020 CA1
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:15 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: read 750 bytes
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Using port 123
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: Got 7 cookies, length 100, 
aead=15.
Feb 12 12:17:15 plnksrf ntpd[148642]: NTSc: NTS-KE req to 
time.cloudflare.com:1234 took 0.140 sec, OK
Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: DNS lookup of 
ntpmon.dcs1.biz took 0.084 sec
Feb 12 12:17:16 plnksrf ntpd[148642]: NTSc: connecting to 
ntpmon.dcs1.biz:4460 => 203.123.48.219:4460
Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:16 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connect_TCP_socket: connect 
failed: Connection refused
Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: DNS lookup of pi4.rellim.com 
took 0.241 sec
Feb 12 12:17:17 plnksrf ntpd[148642]: NTSc: connecting to 
pi4.rellim.com:4460 => 204.17.205.24:4460
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, 
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate subject name: 
/CN=pi4.rellim.com
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate issuer name: 
/C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104, 
aead=15.
Feb 12 12:17:18 plnksrf ntpd[148642]: NTSc: NTS-KE req to pi4.rellim.com 
took 1.107 sec, OK
Feb 12 12:17:18 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: DNS lookup of 
ntp2.glypnod.com took 0.153 sec
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: connecting to 
ntp2.glypnod.com:4460 => 178.62.68.79:4460
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: Using TLSv1.3, 
TLS_AES_256_GCM_SHA384 (256)
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate subject name: 
/CN=ntp2.glypnod.com
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate issuer name: 
/C=US/O=Let's Encrypt/CN=R3
Feb 12 12:17:19 plnksrf ntpd[148642]: NTSc: certificate is valid.
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: read 880 bytes
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: Got 8 cookies, length 104, 
aead=15.
Feb 12 12:17:20 plnksrf ntpd[148642]: NTSc: NTS-KE req to 
ntp2.glypnod.com took 0.273 sec, OK
Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:20 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:21 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
1024 weeks, WNRO
Feb 12 12:17:22 plnksrf ntpd[148642]: REFCLOCK: NMEA(0) date advanced by 
0 weeks, WNRO
(cut)

The GPS really lost the date:

$GPRMC,111848,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*79
$GPGGA,111848,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*61

$GPRMC,111849,A,5150.2208,N,00457.3692,E,000.0,346.3,290602,000.6,E*78
$GPGGA,111849,5150.2208,N,00457.3692,E,1,08,1.3,-0.4,M,45.5,M,,*60
$GPRMC,111850,A,5150.2209,N,00457.3691,E,000.0,346.3,290602,000.6,E*72




Udo



More information about the devel mailing list