<div dir="ltr"><div dir="ltr">On Wed, Sep 25, 2019, at 3:22 AM Richard Laager via devel <<a href="mailto:devel@ntpsec.org">devel@ntpsec.org</a>> wrote:<br></div><div class="gmail_quote"><blockquote style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex" class="gmail_quote">At work, I have two NTP servers. They are part of the pool, with both<br>
IPv4 and IPv6.<br>
<br>
Internally, my systems use my NTP servers (marked with prefer) and the<br>
pool to provide additional sources. As is typical, ntpd prefers IPv6<br>
after resolving the hostname.<br>
<br>
>From time to time, the pool will serve me my own servers. I think ntpd<br>
automatically deduplicates the sources if I get the IPv6 address.<br>
However, if I get one of my own servers back by IPv4 address, I can end<br>
up with a duplicate source.<br></blockquote><div><br></div><div>If you are feeling picky you could restrict the other ipv4 addresses.<br></div><div> </div><blockquote style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex" class="gmail_quote">
I'm not sure how harmful this is. Should I care?<br></blockquote><div><br></div><div>AFAIK it is not harmful just odd and narrowing. You probably should not care.<br></div><div> </div><blockquote style="margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex" class="gmail_quote">
If I should care, any suggestions on what I should do? Is using my<br>
sources plus the pool stupid? If not, maybe we could add some sort of<br>
"blacklist this IP from the pool" feature, which would cover this<br>
scenario plus others?<br></blockquote><div><br></div><div> I am working on a thing, (which should be ready 32nd of never) that would sort of handle this. No, using your sources plus the pool is a good thing. It promotes synergy while avoiding the formation of an echo chamber. Maybe restrict ignore or noserve (I think nopeer is defunct) would work instead of the addition of another knob.</div></div></div>