[Git][NTPsec/ntpsec][master] docs/debug.txt edits
Matt Selsky
gitlab at mg.gitlab.com
Wed Oct 17 03:40:02 UTC 2018
Matt Selsky pushed to branch master at NTPsec / ntpsec
Commits:
9e72bcc7 by Paul Theodoropoulos at 2018-10-17T03:39:57Z
docs/debug.txt edits
- - - - -
1 changed file:
- docs/debug.txt
Changes:
=====================================
docs/debug.txt
=====================================
@@ -49,7 +49,7 @@ are sent to the optional +protostats+ monitor file, as described on the
link:decode.html[Event Messages and Status Words] page. These and other
error messages are sent to the system log, as described on the
link:msyslog.html[+ntpd+ System Log Messages] page. In real emergencies
-the daemon will sent a terminal error message to the system log and then
+the daemon will send a terminal error message to the system log and then
cease operation.
The next most common problem is incorrect DNS names. Check that each DNS
@@ -63,17 +63,17 @@ problems with the network or firewall configuration.
Unless using the +iburst+ option, the client normally takes a few
minutes to synchronize to a server. If the client time at startup
-happens to be more than 1000 sec distant from NTP time, the daemon exits
+happens to be more than 1000 s distant from NTP time, the daemon exits
with a message to the system log directing the operator to manually set
-the time within 1000 sec and restart. If the time is less than 1000 sec but
-more than 128 sec distant, a step correction occurs and the daemon
+the time within 1000 s and restart. If the time is less than 1000 s but
+more than 128 s distant, a step correction occurs and the daemon
restarts automatically.
-When started for the first time and a frequency file is not present, the
-daemon enters a special mode in order to calibrate the frequency. This
-takes 900 sec during which the time is not disciplined. When calibration
-is complete, the daemon creates the frequency file and enters normal
-mode to amortize whatever residual offset remains.
+When started for the first time and a frequency file - usually ntp.drift -
+is not present, the daemon enters a special mode in order to calibrate the
+frequency. This takes 900 s during which the time is not disciplined. When
+calibration is complete, the daemon creates the frequency file and enters
+normal mode to amortize whatever residual offset remains.
The +ntpq+ commands +pe+, +as+ and +rv+ are normally sufficient to
verify correct operation and assess nominal performance. The
@@ -93,7 +93,7 @@ link:ntpq.html#rv[+rv assocID+] command, where +assocID+ is the
association ID, displays the link:ntpq.html#peer[peer variables]
billboard, including the link:decode.html#peer[peer status word]. Note
that, except for explicit calendar dates, times are in milliseconds and
-frequencies are in parts-per-million (PPM).
+frequencies are in parts-per-million (ppm).
A detailed explanation of the system, peer and clock variables in the
billboards is beyond the scope of this page; however, a comprehensive
@@ -139,8 +139,8 @@ link:ntpviz.html[ntpviz].
== Large Frequency Errors ==
The frequency tolerance of computer clock oscillators varies widely,
-sometimes above 500 PPM. While the daemon can handle frequency errors up
-to 500 PPM, or 43 seconds per day, values much above 100 PPM reduce the
+sometimes above 500 ppm. While the daemon can handle frequency errors up
+to 500 ppm, or 43 seconds per day, values much above 100 ppm reduce the
headroom, especially at the lowest poll intervals. To determine the
particular oscillator frequency, start +ntpd+ using the +noselect+
option with the +server+ configuration command.
@@ -148,7 +148,7 @@ option with the +server+ configuration command.
Record the time of day and offset displayed by the +ntpq+
link:ntpq.html#peer[+peer+] command. Wait for an hour or so and record the
time of day and offset. Calculate the frequency as the offset difference
-divided by the time difference. If the frequency is much above 100 PPM,
+divided by the time difference. If the frequency offset is much above 100 ppm,
the link:ntpfrob.html[{ntpfrob}] program might be useful to adjust the
kernel clock frequency below that value. For systems that do not support
this program, this might be one using a command in the system startup
@@ -235,7 +235,10 @@ running.
3. Verify using +ping+ or other utility that packets actually do make
the round trip between the client and server. Verify using +dig+,
+nslookup+ or other utility that the DNS server names do exist and
-resolve to valid Internet addresses.
+resolve to valid Internet addresses. Be aware that ICMP (ping) packets
+may be firewalled or filtered anywhere in the path. Ping failure does not
+explicitly mean that the client and server cannot exchange NTP's
+UDP traffic.
4. Check that the remote NTP server is up and running. The usual
evidence that it is not is a +Connection refused+ message.
@@ -244,7 +247,7 @@ evidence that it is not is a +Connection refused+ message.
packets sent counters are incrementing. If the sent counter does not
increment and the configuration file includes configured servers,
something may be wrong in the host network or interface configuration.
-If this counter does increment, but the received counter does not
+If the sent counter does increment, but the received counter does not
increment, something may be wrong in the network or the server NTP
daemon may not be running or the server itself may be down or not
responding.
@@ -255,8 +258,9 @@ received packets are probably being discarded for some reason. If this
is the case, the cause should be evident from the +flash+ variable as
discussed above and on the +ntpq+ page. It could be that the server has
disabled access for the client address, in which case the +refid+ field
-in the +ntpq+ peers billboard will show a kiss code. See earlier on this
-page for a list of kiss codes and their meaning.
+in the +ntpq+ peers billboard will show a kiss code. See
+link:decode.html#kiss[Kiss Codes] for a full list of the codes and their
+meanings.
7. If the +reach+ values in the peers billboard show the servers are
alive and responding, note the tattletale symbols at the left margin,
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/9e72bcc7fb2956e99f36138700676ac4d7427824
--
View it on GitLab: https://gitlab.com/NTPsec/ntpsec/commit/9e72bcc7fb2956e99f36138700676ac4d7427824
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ntpsec.org/pipermail/vc/attachments/20181017/658eae4a/attachment-0001.html>
More information about the vc
mailing list