[ntpsec commit] Various typos and tweaks.
Hal Murray
murray at ntpsec.org
Sun Oct 4 02:58:39 UTC 2015
Module: ntpsec
Branch: master
Commit: 3c745bcdd40b0c767fbc0c61631f50c9643781c4
Changeset: http://git.ntpsec.org/ntpsec/commit/?id=3c745bcdd40b0c767fbc0c61631f50c9643781c4
Author: Hal Murray <hmurray at megapathdsl.net>
Date: Sat Oct 3 19:57:58 2015 -0700
Various typos and tweaks.
---
ntpd/ntp.conf.txt | 51 +++++++++++++++++++++++++++------------------------
1 file changed, 27 insertions(+), 24 deletions(-)
diff --git a/ntpd/ntp.conf.txt b/ntpd/ntp.conf.txt
index 4e08e3a..d660fb3 100644
--- a/ntpd/ntp.conf.txt
+++ b/ntpd/ntp.conf.txt
@@ -67,6 +67,7 @@ applicable to each command are listed below. Use of options not listed
may not be caught as an error, but may result in some weird and even
destructive behavior.
+FIXME: --enable-ipv6 ??
If the Basic Socket Interface Extensions for IPv6 (RFC-2553) is
detected, support for the IPv6 address family is generated in addition
to the default support of the IPv4 address family. In a few cases,
@@ -283,6 +284,7 @@ storage. Public key management is based on X.509 certificates, which can
be provided by commercial services or produced by utility programs in
the OpenSSL software library or the NTPv4 distribution.
+//FIXME: page reference may be invalid
While the algorithms for symmetric key cryptography are included in the
NTPv4 distribution, public key cryptography requires the OpenSSL
software library to be installed before building the NTP distribution.
@@ -353,12 +355,12 @@ additional keys can be used as passwords for the {ntpqman}
utility program.
When {ntpdman} is first started, it reads the key file specified
-in thekeysconfiguration command and installs the keys in the key cache.
-However, individual keys must be activated with thetrustedcommand before
+in the keys configuration command and installs the keys in the key cache.
+However, individual keys must be activated with the trusted command before
use. This allows, for instance, the installation of possibly several
batches of keys and then activating or deactivating each batch remotely
using {ntpqman}. This also provides a revocation capability
-that can be used if a key becomes compromised. The controlkeycommand
+that can be used if a key becomes compromised. The controlkey command
selects the key used as the password for the {ntpqman} utility.
=== Public Key Cryptography ===
@@ -391,7 +393,7 @@ file, required certificate file and optional sign key file, leapsecond
file and identity scheme files. The digest/signature scheme is specified
in the X.509 certificate along with the matching sign key. There are
several schemes available in the OpenSSL software library, each
-identified by a specific string such asmd5WithRSAEncryption, which
+identified by a specific string such as md5WithRSAEncryption, which
stands for the MD5 message digest with RSA encryption scheme. The
current NTP distribution supports all the schemes in the OpenSSL
library, including those based on RSA and DSA digital signatures.
@@ -531,7 +533,7 @@ contain the value _trustRoot_;. Other extension fields are ignored.
`controlkey` _key_::
Specifies the key identifier to use with the
{ntpqman} utility, which uses the standard protocol defined in
- RFC-1305. Thekeyargument is the key identifier for a trusted key,
+ RFC-1305. The _key_ argument is the key identifier for a trusted key,
where the value can be in the range 1 to 65,534, inclusive.
`crypto` [`cert` _file_] [`leap` _file_] [`randfile` _file_] [`host` _file_] [`sign` _file_] [`gq` _file_] [`gqpar` _file_] [`iffpar` _file_] [`mvpar` _file_] [`pw` _password_]::
@@ -602,7 +604,7 @@ contain the value _trustRoot_;. Other extension fields are ignored.
authentication procedures require that both the local and remote
servers share the same key and key identifier for this purpose,
although different keys can be used with different servers.
- Thekeyarguments are 32-bit unsigned integers with values from 1 to
+ The _key_ arguments are 32-bit unsigned integers with values from 1 to
65,534.
=== Error Codes ===
@@ -881,8 +883,6 @@ Note that this command can be sent from the
suffix consists of a dot, the letter _a_, and an 8-digit number.
This number is taken to be the number of seconds the server is
running at the start of the corresponding 24-hour period.
- Information is only written to a file generation by specifying
- `enable`; output is prevented by specifying `disable`.
_link_ | _nolink_::
It is convenient to be able to access the current element of a
@@ -898,6 +898,8 @@ Note that this command can be sent from the
`enable` | `disable`::
Enables or disables the recording function.
+ Information is only written to a file generation by specifying
+ `enable`; output is prevented by specifying `disable`.
== Access Control Support ==
@@ -1001,7 +1003,7 @@ server operator cooperates.
specified in the discard command. A history of clients is kept using
the monitoring capability of {ntpdman}. Thus, monitoring is
always active as long as there is a restriction entry with
- thelimitedflag.
+ the limited flag.
`lowpriotrap`;;
Declare traps set by matching hosts to be low priority. The number
of traps a server can maintain is limited (the current limit is 3).
@@ -1125,7 +1127,7 @@ specified in the _manycastclient_, command and, under normal
circumstances, increments to the _maxpolll_ value specified in this
command. Initially, the TTL is set at the minimum hops specified by the
ttl command. At each retransmission the TTL is increased until reaching
-the maximum hops specified by this command or a sufficient number client
+the maximum hops specified by this command or a sufficient number of client
associations have been found. Further retransmissions use the same TTL.
The quality and reliability of the suite of associations discovered by
@@ -1146,7 +1148,7 @@ manycast poll interval is doubled. For each transmission after that, the
poll interval is doubled again until reaching the maximum of eight times
_maxpoll_. Further transmissions use the same poll interval and TTL
values. Note that while all this is going on, each client/server
-association found is operating normally it the system poll interval.
+association found is operating normally at the system poll interval.
Administratively scoped multicast boundaries are normally specified by
the network router configuration and, in the case of IPv6, the link/site
@@ -1157,7 +1159,7 @@ values to match the scope rules.
It is often useful to narrow the range of acceptable servers which can
be found by manycast client associations. Because manycast servers
respond only when the client stratum is equal to or greater than the
-server stratum, primary (stratum 1) servers fill find only primary
+server stratum, primary (stratum 1) servers will find only primary
servers in TTL range, which is probably the most common objective.
However, unless configured otherwise, all manycast clients in TTL range
will eventually find all primary servers in TTL range, which is probably
@@ -1287,7 +1289,7 @@ collecting all servers in scope.
== Reference Clock Support ==
-The NTP Version 4 daemon supports some three dozen different radio,
+The NTP Version 4 daemon supports some two dozen different radio,
satellite and modem reference clocks plus a special pseudo-clock used
for backup or when no other clock source is available. Detailed
descriptions of individual device drivers and options can be found in
@@ -1322,8 +1324,8 @@ clocks in a manner analogous to normal NTP peers as much as possible.
Reference clocks are identified by a syntactically correct but invalid
IP address, in order to distinguish them from normal NTP peers.
Reference clock addresses are of the form 127.127.t_._u_, where _t_ is
-an integer denoting the clock type and _u_ indicates the unit number in
-the range 0-3. While it may seem overkill, it is in fact sometimes
+an integer denoting the clock type and _u_ indicates the unit number.
+While it may seem overkill, it is in fact sometimes
useful to configure multiple reference clocks of the same type, in which
case the unit numbers must be unique.
@@ -1351,11 +1353,11 @@ The stratum number of a reference clock is by default zero. Since the
{ntpdman} daemon adds one to the stratum of each peer, a primary
server ordinarily displays an external stratum of one. In order to
provide engineered backups, it is often useful to specify the reference
-clock stratum as greater than zero. Thestratumoption is used for this
+clock stratum as greater than zero. The stratum option is used for this
purpose. Also, in cases involving both a reference clock and a
pulse-per-second (PPS) discipline signal, it is useful to specify the
reference clock identifier as other than the default, depending on the
-driver. Therefidoption is used for this purpose. Except where noted,
+driver. The refid option is used for this purpose. Except where noted,
these options apply to all clock drivers.
== Reference Clock Commands
@@ -1515,11 +1517,11 @@ and that file system links, symbolic or otherwise, should be avoided.
`logconfig` _configkeyword_::
This command controls the amount and type of output written to the
- system _syslog(3) facility or the alternate log file. By
- default, all output is turned on. Allconfigkeywordkeywords can be
+ system _syslog(3)_ facility or the alternate log file. By
+ default, all output is turned on. All _configkeyword_ keywords can be
prefixed with â=â, â+â and â-â, where â=â sets the syslog(3) priority
mask, â+â adds and â-â removes messages. syslog(3) messages can be
- controlled in four classes (clock,peer,sysandsync). Within these
+ controlled in four classes (clock,peer,sys and sync). Within these
classes four types of messages can be controlled: informational
messages (info), event messages (events), statistics messages
(statistics) and status messages (status).
@@ -1528,7 +1530,7 @@ Configuration keywords are formed by concatenating the message class
with the event class. The _all_ prefix can be used instead of a
message class. A message class may also be followed by the _all_
keyword to enable/disable all messages of the respective message
-class.Thus, a minimal log configuration could look like this:
+class. Thus, a minimal log configuration could look like this:
+
--------------------------------
logconfig =syncstatus +sysevents
@@ -1548,7 +1550,7 @@ and so on is suppressed.
`logfile` _logfile_::
This command specifies the location of an alternate log file to be
- used instead of the default system _syslog_(3)_facility. This is the
+ used instead of the default system _syslog_(3)_ facility. This is the
same operation as the -l command line option.
`setvar` _variable_ [_default_]::
@@ -1631,10 +1633,10 @@ The variables operate as follows:
Setting this to zero will prevent any attemp to lock memory.
`stacksize` _4kPages_;;
Specifies the maximum size of the process stack on systems with the
+ mlockall()_function. Defaults to 50 4k pages (200 4k pages in OpenBSD).
`filenum` _filedescriptors_;;
Specifies the maximum number of file descriptors ntpd may have open
- at once. Defaults to the system default. mlockall()_function.
- Defaults to 50 4k pages (200 4k pages in OpenBSD).
+ at once. Defaults to the system default.
`trap` _host_address_ [`port` _port_number_] [`interface` _interface_address_]::
This command configures a trap receiver at the given host address and
@@ -1709,6 +1711,7 @@ The _ntpkey_host_ files are really digital certificates. These should be
obtained via secure directory services when they become universally
available.
+//FIXME: ntp.org reference
Please send bug reports to: http://bugs.ntp.org, bugs at ntp.org
== NOTES ==
More information about the vc
mailing list