Re: Trace ntp sanity checks?
> we are having problems to synchronize linux & aix ntp-clients to a
> ntp-broadcast-packets are received by the clients, but all servers are
> rejected by the clients after a few minutes.
> we found out, that the ntp-servers do not pass the sanity-checks on the
> clients and get probably rejected because of that.
> How can we further track down which of the sanity-checks fails and why...[/color]
If the NTP on the client has been compiled with debug option then you can
run ntpd with the -d option ans see what it prints on the console.
Otherwise, if the broadcast server is listed in the output of "ntpq -p" you
can see details of the server association using the following commands.
Print billboard of the associations:
# ntpq -p
remote refid st t when poll reach delay offset jitter
*gateway.py.mein .GPSi. 1 u 34 64 377 0.148 -0.011 0.362
Find out the association IDs:
# ntpq -c as
ind assID status conf reach auth condition last_event cnt
1 41266 9614 yes yes none sys.peer reachable 1
In this case the association ID is 41266. Use the ID to find more details on
# ntpq -c "rv 41266"
assID=41266 status=9614 reach, conf, sel_sys.peer, 1 event, event_reach,
srcadr=gateway.py.meinberg.de, srcport=123, dstadr=172.16.3.27,
dstport=123, leap=00, stratum=1, precision=-18, rootdelay=0.000,
rootdisp=0.580, refid=GPSi, reach=377, unreach=0, hmode=3, pmode=4,
hpoll=6, ppoll=6, flash=00 ok, keyid=0, ttl=0, offset=-0.659,
delay=0.163, dispersion=2.055, jitter=0.307,
reftime=cb00fb6b.000192a7 Wed, Dec 5 2007 11:26:51.000,
org=cb00fb71.b05ff1d8 Wed, Dec 5 2007 11:26:57.688,
rec=cb00fb71.b0814599 Wed, Dec 5 2007 11:26:57.689,
xmt=00000000.00000000 Thu, Feb 7 2036 7:28:16.000,
filtdelay= 0.18 0.19 0.16 0.23 0.20 0.23 0.19 0.21,
filtoffset= -0.42 -0.61 -0.66 -0.76 -0.88 -1.04 -1.14 -1.06,
filtdisp= 0.01 1.00 1.97 2.96 3.92 4.90 5.86 6.85
You should not interpret the output above. It's just a quick test to show
how to proceed.
If you post your output of the ntpq -p and ntpq -c "rv ..." commands here
then we may be able to help.
And, the versions of NTP on the server and on the clients might be