Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6

[ Thread Index | Date Index | More chrony.tuxfamily.org/chrony-users Archives ]


On Thu, Dec 01, 2022 at 08:16:29AM +0000, chengyechun wrote:
> Yes, I use ntsratelimit to explain this phenomenon. My configuration is ntsratelimit interval 3 burst 1. I find that the default value of leak is 2, indicating that the leak rate is 0.25, which seems to explain why the leak rate is 24s. However, when leak is changed to 3, the leak rate is 0.125, the tls handshake failure time does not increase, even if interval is changed to 4, which means the interval is 16s. It's still the same phenomenon,

The "leak" is randomly distributed. Have you tried to run the test
longer and see if the average converges to the expected value?

-- 
Miroslav Lichvar


-- 
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx 
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx 
with "help" in the subject.
Trouble?  Email listmaster@xxxxxxxxxxxxxxxxxxxx.


Mail converted by MHonArc 2.6.19+ http://listengine.tuxfamily.org/