答复: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6 |
[ Thread Index |
Date Index
| More chrony.tuxfamily.org/chrony-users Archives
]
-----邮件原件-----
发件人: Miroslav Lichvar [mailto:mlichvar@xxxxxxxxxx]
发送时间: 2022年12月1日 15:59
收件人: chrony-users@xxxxxxxxxxxxxxxxxxxx
主题: Re: 答复: 答复: 答复: [chrony-users] ipV4 and ipV6
On Thu, Dec 01, 2022 at 02:10:42AM +0000, chengyechun wrote:
> Specifying multiple ip_addresses is valid. I found that when I set ntsrefresh to 1, the TLS handshake fails every 24s after the TLS handshake fails. This seems to be regular. Where can I know this from the code?
Maybe you have rate limiting enabled on the server?
Yes, I use ntsratelimit to explain this phenomenon. My configuration is ntsratelimit interval 3 burst 1. I find that the default value of leak is 2, indicating that the leak rate is 0.25, which seems to explain why the leak rate is 24s. However, when leak is changed to 3, the leak rate is 0.125, the tls handshake failure time does not increase, even if interval is changed to 4, which means the interval is 16s. It's still the same phenomenon,
--
Miroslav Lichvar
--
To unsubscribe email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "unsubscribe" in the subject.
For help email chrony-users-request@xxxxxxxxxxxxxxxxxxxx
with "help" in the subject.
Trouble? Email listmaster@xxxxxxxxxxxxxxxxxxxx.