summaryrefslogtreecommitdiffstats
path: root/usr.sbin/xntpd/conf/ntp.conf.nsf
blob: 298bb7a6905e1dcece8f15f2c461abbc08856e3e (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
#
# Maybe an alternate xntpd configuration for NSS#17
#

#
# precision is supported, but you don't really need it.  The code
# will determine a precision from the kernel's value of _hz which
# is fine.  Note you shouldn't claim too good a precision on a
# Unix machine even if the clock carries a lot of bits, since
# precision also depends on things like I/O delays and scheduling
# latencies, which Unix machines control poorly.  If you claim better
# than -6 or -7 it will make the anti-hop aperture tighter than is
# reasonable for a Unix machine.
#
#precision -7

#
# peers are ncarfuzz.ucar.edu umd1.umd.edu dcn5.udel.edu fuzz.sdsc.edu
# syntax is  peer addr [ key 1-15 ] [ version 1_or_2 ]
#

peer 128.116.64.3	# ncarfuzz.ucar.edu
peer 128.8.10.1		# umd1.umd.edu
peer 128.4.0.5		# dcn5.udel.edu
peer 192.12.207.1	# fuzz.sdsc.edu

#
# Drift file.  Put this in a directory which the daemon can write to.
# No symbolic links allowed, either, since the daemon updates the file
# by creating a temporary in the same directory and then rename()'ing
# it to the file.
#
# This is a nice feature.  Once you've got the drift computed it hardly
# ever takes more than an hour or so to resync after a restart.
#
driftfile /etc/ntp.drift

#
# The server statement causes polling to be done in client mode rather
# than symmetric active.  It is an alternative to the peer command
# above.  Which you use depends on what you want to achieve.  Usually
# it doesn't matter.  Syntax is:
#
#server 128.100.49.1 key 4 version 1

#
# The broadcast statement tells it to start broadcasting time out one
# of its interfaces.  Syntax is
#
#broadcast 128.100.49.255 # [ key n ] [ version n ]

#
# broadcastclient tells the daemon whether it should attempt to sync
# to broadcasts or not.  Defaults to `no'.
#
#broadcastclient yes # or no

#
# broadcastdelay configures in a default round-trip delay to use for
# broadcast time.  It may poll to improve this estimate.
#
#broadcastdelay 0.0095		# in seconds

#
# authenticate configures us into strict authentication mode (or not).
#
#authenticate yes	# or no.  Default is no

#
# authdelay is the time it takes to do an NTP encryption on this host.
# The current routine is pretty fast.
#
#authdelay 0.000340	# in seconds

#
# trustedkey are used when authenticate is on.  We only trust (and sync to)
# peers who know these keys.
#
#trustedkey 1 3 4 8

#
# monitor turns on the monitoring facility.  See xntpdc's monlist command.
# This shows a lot of neat stuff, but I'm not fussy about the implementation.
# Uses up to 20Kb of memory at run time.  You could try this.
#
#monitor yes		# or no.  Default is no

#
# keys points at the file which holds the authentication keys.
#
#keys /etc/ntp.keys

#
# requestkey indicates which key is to be used for validating
# runtime reconfiguration requests.  If this isn't defined, or the
# key isn't in the keys file, you can't do runtime reconfiguration.
# controlkey indicates which key is to be used for validating
# mode 6 write variables commands.  If this isn't defined you can't
# do it.  The only thing the latter is used for is to set leap second
# warnings on machines with radio clocks.
#
#requestkey 65535
#controlkey 65534

#
# restrict places restrictions on the punters.  This is implemented as
# a sorted address-and-mask list, with each entry including a set of
# flags which define what a host matching the entry *can't* do (the sort
# also saves CPU time searching the table since it needn't be searched
# to the end).  The last match in the table defines what the host does.
# The default entry, which everyone matches, is first, most specific
# matches are later in the table.  The flags are:
#
# ignore	- ignore all traffic from host
# noserve	- don't give host any time (but let him make queries?)
# notrust	- give host time, let him make queries, but don't sync to him
# noquery	- host can have time, but not make queries
# nomodify	- allow the host to make queries except those which are
#		  actually run-time configuration commands.
# notrap	- don't allow matching hosts to set traps.  If noquery is
#		  set this isn't needed
# lowpriotrap	- if this guy sets a trap make it easy to delete
# ntpport	- a different kind of flag.  Makes matches for this entry
#		  possible only if the source port is 123.
#
# To understand this better, take a look at xntpdc's reslist command when the
# server is running.  This usually prints in the sorted order.
#
# This should match the NSS 17 stuff.  Default mask is all ones.

restrict default ignore		# ignore almost everyone

#
# These guys can be served time and make non-modifying queries
#
restrict 129.140.0.0 mask 255.255.0.0 notrust nomodify
restrict 35.1.1.42 notrust nomodify

#
# Rest of 35.1.1 gets to look but not touch
#
restrict 35.1.1.0 mask 255.255.255.0 noserve nomodify

#
# modifications can be made from local NSS only
#
restrict 129.140.17.0 mask 255.255.255.0 notrust
restrict 127.0.0.1 notrust

#
# take time from the following peers, but don't let them peek or modify
#
restrict 128.116.64.3 noquery
restrict 128.8.10.1 noquery
restrict 128.4.0.5 noquery
restrict 192.12.207.1 noquery
OpenPOWER on IntegriCloud