答复: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6 |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-users Archives
]
-----邮件原件-----
发件人: Miroslav Lichvar [mailto:mlichvar@xxxxxxxxxx]
发送时间: 2022年12月1日 16:25
收件人: chrony-users@xxxxxxxxxxxxxxxxxxxx
主题: Re: 答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6
On Thu, Dec 01, 2022 at 08:16:29AM +0000, chengyechun wrote:
> Yes, I use ntsratelimit to explain this phenomenon. My configuration
> is ntsratelimit interval 3 burst 1. I find that the default value of
> leak is 2, indicating that the leak rate is 0.25, which seems to
> explain why the leak rate is 24s. However, when leak is changed to 3,
> the leak rate is 0.125, the tls handshake failure time does not
> increase, even if interval is changed to 4, which means the interval
> is 16s. It's still the same phenomenon,
The "leak" is randomly distributed. Have you tried to run the test longer and see if the average converges to the expected value?
I see, I'll write a test case to verify it and explain the result later. But it doesn't seem to make much sense.
--
Miroslav Lichvar
--
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.