Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6 |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-users Archives
]
- To: chrony-users@xxxxxxxxxxxxxxxxxxxx
- Subject: Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6
- From: Miroslav Lichvar <mlichvar@xxxxxxxxxx>
- Date: Thu, 1 Dec 2022 09:25:23 +0100
- Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1669883127; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=c3OBgcX8VFZ8141RZColisGtBfrnx4S45+3syzGHn20=; b=QPjibcJ9DspCnc7mGTIOlNMjWF8JWBvMXFi+o2efOOSnl8/v6mytDsZlIS94JHqBhY/U8N pKTSJppN5W3nOyEOaxTlmlXQDVtT5hXzOTMINg789RkNGCxa7HHiIOLKsJddw7h3KOrVqV NWSEMHrxZP1e6ZG4UdJenRrp/HOCLC8=
On Thu, Dec 01, 2022 at 08:16:29AM +0000, chengyechun wrote:
> Yes, I use ntsratelimit to explain this phenomenon. My configuration is ntsratelimit interval 3 burst 1. I find that the default value of leak is 2, indicating that the leak rate is 0.25, which seems to explain why the leak rate is 24s. However, when leak is changed to 3, the leak rate is 0.125, the tls handshake failure time does not increase, even if interval is changed to 4, which means the interval is 16s. It's still the same phenomenon,
The "leak" is randomly distributed. Have you tried to run the test
longer and see if the average converges to the expected value?
--
Miroslav Lichvar
--
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.