[prev in list] [next in list] [prev in thread] [next in thread]
List: timekeepers
Subject: [time] New semi-abusive client type noticed over the last day
From: shoppa () trailing-edge ! com (Tim Shoppa)
Date: 2005-01-12 0:04:27
Message-ID: 41E45B62.nailGZ511O5IB () mini-me ! trailing-edge ! com
[Download RAW message or body]
> OK I see how the code works
> Between 2 and 8 samples received gets aggressive timing (5 second
> polling) then it backs off to a value between 30 and 300 seconds based
> on the offset (1/2 second = 30 second polling, 50 ms or less = 300
> second polling).
Rather, why the code *doesn't* work. That has to be the most ass-backward
polling algorithm I've ever seen. If there's a lot of network delay,
(introducing a large offset, especially if the delay is assymetrical),
then it hammers even harder on that particular host. I was a little
nonchalant about openntp before, but now I see: It is the ntp client
that is Most Evil.
Tim.
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic